The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Key management in sensor networks is the core security protocols for wireless sensor networks (WSNs) in the hostile environment. Sensor nodes have highly constrained resource like limited battery power, memory, processing capabilities, etc. These limitations make infeasible to apply traditional key management techniques such as public key cryptography in the WSNs. For the existing key pre-distribution...
In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collectorpsilas retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption...
With the widely use of wireless sensor network (WSN), data forwarding security has become more and more important to the whole network. In order to avoid the selective forwarding attack, we proposed a scheme of secure data transmission which can forward the data safely, and detect the selective forwarding attack. In this paper, we judge the trust value of each node to select a secure path for message...
In this work, to obtain stronger connectivity, we propose and analyze a scheme extended by random key pre-distribution (RKP), which can work only in highly dense networks and require path construction. We investigate the threshold property of multi-hop key connectivity in random geometric networks. We have made use of the Jansonpsilas inequality to deal with the dependency overhead. Accordingly, our...
Wireless sensor networks(WSN) usually consists of a large number of tiny sensors with limited computation capacity, memory space and power resource. WSN's are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource constrained nodes and lack of tamper-resistant packages. To achieve security in wireless sensor networks, it is important to encrypt...
Key establishment is a fundamental security issue in wireless sensor networks (WSN). It is the basis to establish the secure communication using cryptographic technologies between sensor nodes. Due to the current resource constraints on sensors, it is infeasible to use traditional key management techniques such as public key cryptography or key distribution center based protocols. So the key predistribution...
The communication of a wireless sensor network can be eaves dropped quite easily due to its properties, thereby requiring a security mechanism. Adding a key management scheme on the wireless sensor network is a kind of solution. This paper proposes a method to enhance the security of the existing random key pre-distribution scheme, that is considered to be suitable in wireless sensor networks. Using...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.