The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With...
Key management in wireless sensor networks is a challenging problem because public key cryptosystems are unsuitable for using in resource constrained sensor nodes, and the nodes could by physically compromised by an adversary. For the existing key pre-distribution schemes, as the number of compromised nodes increasing, the fraction of affected pairwise keys will increase quickly. As a result, a small...
In a user hierarchy, a user belongs to higher-privileged class will have access right to message owned by user in a lower-privileged class; while the opposite in not allowed. Many schemes based on cryptography have been proposed to solve this problem. However, previous schemes need large values associated with each security class. Considering the solution of dynamic access problem in a hierarchy,...
Key agreement is paramount for wireless sensor networks (WSNs) security. Many key pre-distribution schemes have been developed to establish pair wise keys for WSNs. In WSNs, node capture attack is the most serious attack. And existing scheme can not offer strong resilience against node capture attack. In order to improve the resiliency of against sensor nodes capture, this paper proposes an improved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.