Results 11 to 20 of about 6,477,960 (317)

A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method [PDF]

open access: goldSensors, 2016
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment.
Ying Zhang   +3 more
doaj   +4 more sources

A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs [PDF]

open access: yesSensors, 2021
Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game ...
L. Ellen Funderburg, Im-Yeong Lee
doaj   +2 more sources

A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks [PDF]

open access: yesSensors, 2020
The secure transmission of data within a network has received great attention. As the core of the security management mechanism, the key management scheme design needs further research.
Erdong Yuan   +4 more
doaj   +2 more sources

An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge [PDF]

open access: goldSensors, 2008
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving.
Le Xuan Hung   +4 more
doaj   +2 more sources

A Study on the Key Management Strategy for Wireless Sensor Networks

open access: diamondAdvances in Distributed Computing and Artificial Intelligence Journal, 2015
Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group
Hoon KO   +5 more
doaj   +3 more sources

Lightweight and dynamic authenticated key agreement and management protocol for smart grid

open access: yesFrontiers in Energy Research, 2023
With the development of IoT and 5G, the smart grid, as one of the key component for the smart city, can provide the uninterrupted and reliable electricity service by properly adjusting the electricity supply according to the consumption of users.
Feng Zhai   +4 more
doaj   +1 more source

A Secure and Efficient Group Key Management Scheme for Clusters of String Inverters

open access: yesApplied Sciences, 2020
A string inverter converts the low voltage direct current coming from the string of its Photovoltaic (PV) panels into alternating current to be exported to the grid.
Mariano Basile   +3 more
doaj   +1 more source

Secure Video Surveillance Framework in Smart City

open access: yesSensors, 2021
In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention.
Hao Li   +4 more
doaj   +1 more source

A Survey on Key Management and Authentication Approaches in Smart Metering Systems

open access: yesEnergies, 2023
The implementation of the smart grid (SG) and cyber-physical systems (CPS) greatly enhances the safety, reliability, and efficiency of energy production and distribution.
Mohamed S. Abdalzaher   +4 more
doaj   +1 more source

Group key management based on semigroup actions [PDF]

open access: yes, 2016
In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way.
Lopez-Ramos, Juan Antonio   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy