The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With...
Broadcast authentication is a critical security service in wireless sensor networks (WSNs). However, due to resource constrains of sensor nodes, providing authentication mechanism for broadcast message is difficult. ??TESLA is a lightweight broadcast authentication protocol, which use a one-way hash chain and the delayed disclosure of keys to provide the authentication service. However, it suffers...
Key management in sensor networks is the core security protocols for wireless sensor networks (WSNs) in the hostile environment. Sensor nodes have highly constrained resource like limited battery power, memory, processing capabilities, etc. These limitations make infeasible to apply traditional key management techniques such as public key cryptography in the WSNs. For the existing key pre-distribution...
Broadcast authentication is an essential security service in wireless sensor networks, as it allows a sender to broadcast messages to multiple nodes in an authenticated way. This paper propose a light-weight, scalable broadcast authentication scheme over a long period of time. Instead of using multi-level key chains as in multilevel ??TESLA, the scheme uses multiple short key chains to replace one...
Key agreement is paramount for wireless sensor networks (WSNs) security. Many key pre-distribution schemes have been developed to establish pair wise keys for WSNs. In WSNs, node capture attack is the most serious attack. And existing scheme can not offer strong resilience against node capture attack. In order to improve the resiliency of against sensor nodes capture, this paper proposes an improved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.