The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secret key establishment and freshness are challenging task in resource constrained wireless sensor networks (WSNs). A large number of messages are exchanged for key establishment at startup and every time a node join or leave the group to refresh keys. These operations incur huge computation and communication cost that reduces the network life time. To minimize energy consumption and improve network...
With the fast development of wireless sensor network (WSN) and the Internet of things (IOT), as the key technologies of both of them, the security of nodes of networks is becoming more and more important. Compared with other protocols, hierarchical topology has advantages in energy saving and network control, but almost none of existing hierarchical protocols has been considered about the security...
Trust is an important issue when a wireless sensor network is used in the fields such as military surveillance and reconnaissance, emergency rescue, and intelligent residential district. Due to the restrictions of energy, resource, and computing power in the sensor nodes, the traditional secure solutions cannot be applied to the wireless sensor networks directly. In this paper, applying the concept...
In Wireless Sensor Networks, key management is required to offer a secure communication between sensor nodes. Many key management mechanisms have been proposed while considering the characteristics of sensor nodes. Despite the advances of key management techniques, wireless sensor networks still have vulnerable point since sensor nodes have the communication restrictions such as an ultralight, a low...
In sensor networks, the rare resources are very important, like the limited computation ability, memory size, energy, and communication bandwidth. In the past, several studies either focus on full connection or reducing the memory usage. In this work, we proposed a novel key management scheme which fulfills power control, less memory usage, and full connection. In our scheme, the sink node first generates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.