The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secret key establishment and freshness are challenging task in resource constrained wireless sensor networks (WSNs). A large number of messages are exchanged for key establishment at startup and every time a node join or leave the group to refresh keys. These operations incur huge computation and communication cost that reduces the network life time. To minimize energy consumption and improve network...
Key management for wireless sensor networks has been a challenging research topic since stringent resource constraints make the key pre-distribution schemes difficult to implement. This paper proposes a novel key pre-distribution method based on trivariate symmetry polynomial and hash function. First, the base station assigns some random numbers to each node using BIBD, then two nodes calculate the...
In a wireless network, when the adversary is being part of the network, they are well known about the protocol being used and other network secrets. A transceiver is enough to get the key and decrypt the message. Hence, simple cryptographic mechanism is not enough to protect the message. Moreover, jamming can be easily performed by modifying the packet header. Hence we have to go for advanced mechanism...
Key establishment has been a challenging problem in wireless sensor networks. With the increasing of the sensor network applications, many key predistribution schemes are proposed. In most key predistribution schemes, sensors are loaded with preassigned keys. Sensor nodes discover common keys to establish secure connection with neighboring nodes. Nodes that are not directly connected use intermediate...
Wireless sensor networks are a new class of distributed systems that are an integral part of the physical space they inhabit. Key distribution plays an important role in wireless sensor networks. In WSN, node capture attack is the most series attack. The aim of this paper is to improve the resistance against the node capture attack. So a double hash function key pre-distribution scheme is used to...
As Wireless Mesh Networks (WMNs) are newly emerging wireless technologies, they are designed to have huge potential for strengthening Internet deployment and access. However, they are far from mature for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. The main challenges exposed to the security of WMNs come from the facts of the shared nature...
Wireless sensor networks are widely used in a variety of commercial and military applications. As a fundamental requirement for providing security functionality in sensor networks, key management plays an essential role in authentication and encryption. In this paper, we propose a Refined Key Link Tree (RKLT) scheme that incorporates dirty key path into the key link tree-based group key management...
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth and defection of centra authority. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques...
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely associate a group of sensor nodes to a patient, and generate necessary secret keys to protect the subsequent wireless communications. Due to the the ad hoc nature of the BAN and the extreme resource constraints of sensor...
We present a suite of key management scheme for heterogeneous sensor networks. In view of different types of communications, a single key can not satisfy various communication requirements. It is necessary to study the establishment and renewal of different types of keys in heterogeneous sensor networks. In this paper, we propose a new key management scheme which can support five types of communications...
In wireless sensor networks, most of the existing key management schemes, establish shared keys for all pairs of neighbor sensors without considering the communication between these nodes. This results in causing huge overhead. For large scale WSNs, these schemes still need each sensor to be loaded with a bulky amount of keys. In many-to-one traffic pattern of sensor networks, large numbers of sensor...
Wireless sensor networks (WSN) are emerging technologies that enable various applications including tracking, monitoring and control. Because of ad-hoc, wireless communication and limitation of resources, much vulnerability arises. In false report injection attacks, an attacker tries to confuse a user or deplete energy resource of sensor nodes by injecting false reports through compromised nodes....
Wireless sensor networks (WSNs) are wireless ad hoc networks of tiny sensor nodes increasingly deployed for multiple civilian and military applications, including patient monitoring, wildlife monitoring, battlefield surveillance, enemy tracking, etc. Like other computer networks, WSNs must be provided of security services such as key management, confidentiality, integrity and authentication. However,...
Spoofing is a serious threat for both ad hoc and sensor networks, that can cause adverse effects on a network's operations. Although cryptographic authentication can assure the identity of a transmitter, authentication is not always desirable or possible as it requires key management and more extensive computations. In this paper we argue that it is desirable to have a functionality complementary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.