The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme, enabling each forwarding node to check the authenticity of the received message, acts as a defense against these two attacks. To construct an efficient en-route filtering...
User authentication scheme for sensor networks is proposed. In proposed scheme, we employ polynomial share and the hash value with a secret key as the basic means of constructing node authentication procedure in order to avoids the need for public key cryptography and reduce shortage overhead. The proposed scheme not only can achieve authentication mutually between communication two parts and prevent...
The grid-based key predistribution scheme in sensor networks has some advantages over the existing approaches. However, since this scheme is based on polynomial-based approach, it cannot provide authentication service. In this paper, we first present a novel tame-based approach, in which a tame automorphism in algebra is exploited to generate a symmetric and two-one bivariate map, for key predistribution...
Chadha et al. proposed a group key scheme for wireless sensor networks via local collaboration. A group key was derived from base station's broadcast message and a node's secret. However, there is no authentication in the group key scheme. It is essential to share a reliable group key among the entire nodes even though it results in a little overhead.
Sensor networks are widely used in environment exploration and disaster recovery and in military applications due to their self-organization characteristics and distributed nature. As a fundamental requirement for providing security functionality in sensor networks, key management plays a central role in authentication and encryption. In this paper, we present a hexagon-based key predistribution scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.