Results 11 to 20 of about 1,483,664 (290)

Redundancy in Key Management for WSNs [PDF]

open access: yesCryptography, 2018
Security in wireless sensor networks is commonly based on symmetric encryption and requires key-management systems to establish and exchange secret keys. A constraint that is common to many key-management approaches is an upper bound to the total number of nodes in the network.
Gandino, Filippo   +2 more
openaire   +3 more sources

Secure Video Surveillance Framework in Smart City

open access: yesSensors, 2021
In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention.
Hao Li   +4 more
doaj   +1 more source

A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things

open access: yesIEEE Access, 2019
The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others.
Manisha Malik   +2 more
doaj   +1 more source

A Survey on Key Management and Authentication Approaches in Smart Metering Systems

open access: yesEnergies, 2023
The implementation of the smart grid (SG) and cyber-physical systems (CPS) greatly enhances the safety, reliability, and efficiency of energy production and distribution.
Mohamed S. Abdalzaher   +4 more
doaj   +1 more source

An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

open access: yesSensors, 2008
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving.
Le Xuan Hung   +4 more
doaj   +1 more source

Authentication and Key Establishment in Dynamic Wireless Sensor Networks

open access: yesSensors, 2010
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing.
Ying Qiu   +3 more
doaj   +1 more source

Lightweight and dynamic authenticated key agreement and management protocol for smart grid

open access: yesFrontiers in Energy Research, 2023
With the development of IoT and 5G, the smart grid, as one of the key component for the smart city, can provide the uninterrupted and reliable electricity service by properly adjusting the electricity supply according to the consumption of users.
Feng Zhai   +4 more
doaj   +1 more source

Key management scheme with private key self-healing ability in DTN

open access: yes网络与信息安全学报, 2017
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI,Xi-yong ZHANG,Ting-ting ZHANG   +1 more
doaj   +1 more source

The Role of Physical Layer Security in IoT: A Novel Perspective

open access: yesInformation, 2016
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem ...
Tommaso Pecorella   +2 more
doaj   +1 more source

EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems

open access: yesSensors, 2023
In this paper, we propose a user-friendly encrypted storage scheme named EStore, which is based on the Hadoop distributed file system. Users can make use of cloud-based distributed file systems to collaborate with each other.
Yuxiang Chen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy