The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secret key establishment and freshness are challenging task in resource constrained wireless sensor networks (WSNs). A large number of messages are exchanged for key establishment at startup and every time a node join or leave the group to refresh keys. These operations incur huge computation and communication cost that reduces the network life time. To minimize energy consumption and improve network...
Key management for wireless sensor networks has been a challenging research topic since stringent resource constraints make the key pre-distribution schemes difficult to implement. This paper proposes a novel key pre-distribution method based on trivariate symmetry polynomial and hash function. First, the base station assigns some random numbers to each node using BIBD, then two nodes calculate the...
Key establishment has been a challenging problem in wireless sensor networks. With the increasing of the sensor network applications, many key predistribution schemes are proposed. In most key predistribution schemes, sensors are loaded with preassigned keys. Sensor nodes discover common keys to establish secure connection with neighboring nodes. Nodes that are not directly connected use intermediate...
As Wireless Mesh Networks (WMNs) are newly emerging wireless technologies, they are designed to have huge potential for strengthening Internet deployment and access. However, they are far from mature for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. The main challenges exposed to the security of WMNs come from the facts of the shared nature...
Wireless sensor networks are widely used in a variety of commercial and military applications. As a fundamental requirement for providing security functionality in sensor networks, key management plays an essential role in authentication and encryption. In this paper, we propose a Refined Key Link Tree (RKLT) scheme that incorporates dirty key path into the key link tree-based group key management...
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth and defection of centra authority. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques...
Wireless sensor networks (WSN) are emerging technologies that enable various applications including tracking, monitoring and control. Because of ad-hoc, wireless communication and limitation of resources, much vulnerability arises. In false report injection attacks, an attacker tries to confuse a user or deplete energy resource of sensor nodes by injecting false reports through compromised nodes....
Wireless sensor networks (WSNs) are wireless ad hoc networks of tiny sensor nodes increasingly deployed for multiple civilian and military applications, including patient monitoring, wildlife monitoring, battlefield surveillance, enemy tracking, etc. Like other computer networks, WSNs must be provided of security services such as key management, confidentiality, integrity and authentication. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.