The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Key distribution plays an important role in wireless sensor networks (WSNs), for information must be kept secure, even in an environment with limited storage ability and low data processing speed. However, it is a challenge to work in such a harsh requirement environment, the traditional key management scheme such as key distribution center (KDC) and public key cannot be used. Key pre-distribution...
The wireless sensor networks (WSNs) are normally operated in unattended, harsh, or hostile environment. The adversaries may easily compromise some sensor nodes and abuse their shared keys to inject false sensing reports or modify the reports sent by other nodes. Many applications in WSNs require secure group communications, which are supported by group keys. Once a malicious node is detected in the...
A new-generation access network should be able to transport various kinds of dynamically changing sensor information about specific localities or private individuals to different destination servers in a secure manner for processing so that the various processed information can be used in an integrated manner to provide advanced context-aware services. After classifying the various kinds of sensor...
Sensor networks have been proposed for military and scientific applications such as border security and environment monitoring. They are usually deployed in unattended and hostile environments, so security is a major concern. A fundamental requirement in wireless network security is the ability to establish keys between pairs of sensors. In this paper, we propose a new location-based key management...
An increasing body of protocols has been proposed in recent years for detecting node replication attack in sensor networks. Most of them however expose the following limitations: high performance overheads, unreasonable assumptions, etc. To address these issues, we propose two new protocols in this paper: LANCE and SACRED. LANCE is designed to be light-weight in performance at the cost of slightly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.