The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ad hoc networks, etc., in computational cost and communicational overhead and traditional digital signature...
In this paper, we build a secure and energy-efficient tree-structure route for the large-sized wireless sensor networks with only a resource-constrained sink node. Our proposed routing scheme has salient features: light overhead, quick formation, and immediate effectiveness. By constructing a neighbor table that contains the related key and energy information, the security and energy-efficiency of...
With the requirements of mobility, flexibility, and rapid response, public safety Mesh networks are widely used for emergency services to improve the efficiency of public safety communication to prevent or respond to incidents that harm or endanger persons or property. This special field communication brings new security challenges. In this paper, we propose a key agreement scheme with voting receiver...
In this paper, we present an energy-efficient dynamic key management scheme in which new sensor nodes can join a sensor network securely and compromised nodes can be isolated from the network in time. Unlike in centralized and location-based key management schemes, our scheme doesn't depend on such infrastructure as base stations and robots, thus it possesses a high level of flexibility. By using...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.