A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Securing Wireless Sensor Network using Intelligent Techniques
2013
International Journal of Computer Applications
In the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of the network sensor nodes. ...
To address this issue a general framework needs to be developed that permits the use of any pair wise key pre distribution scheme which requires two separate key pools one for the mobile sink to access ...
thanks to all the staff member of the Department of Computer Science and Engineering, GKM College of Engineering and technology and College of Engineering, Guindy Campus, Anna University, Chennai -600 025 for ...
doi:10.5120/12164-7784
fatcat:befs3sl4wvfmpeikc67lg7s3tq
Authentication and Integrity of Data in Wireless Sensor Network with Mobile Sink
2013
International Journal of Computer Applications
The basic work in it is that to allow a three-tier general framework, use of any pair wise key pre-distribution scheme. ...
Traditional techniques are used for keys pre-distributed among the sinks and sensors for pair wise key establishment and authentication. ...
The Q-composite key predistribution scheme also uses a key pool but requires two sensor nodes compute a pair wise key from at least Q predistributed keys they share. ...
doi:10.5120/14472-2766
fatcat:4zj7dd35njhzrfh2ck3zyeic7i
Hash Chain based Key Management for Mobile Heterogeneous Sensor Network
2013
International Journal of Computer Applications
Key management is an important issue for wireless sensor networks because sensors have limited resources as memory, processing speed and battery power. ...
Key management is one of the basic building blocks of sensor network security. Many protocol presented before didn't take much attention on mobility of node. ...
., [9] proposed a unified framework for distributed key management schemes in heterogeneous wireless sensor networks. ...
doi:10.5120/12113-8402
fatcat:pfzm22so7zfijlxosddvnxwg6a
Efficient Resource Allocation in Hybrid Wireless Networks Increase the Capacity
2021
International Journal of Scientific Research in Computer Science Engineering and Information Technology
In many wireless sensor network (WSN) the Mobile sinks(MSs) are very essential applications for efficient data gathering, restricted sensor reprogramming, and for distinguishing and revoking compromised ...
In this project we implemented a new technique with an algorithm named GNDA Good Node Detection Algorithm Based Approach technique with Wireless Sensor Networks. ...
[2] present unmitigated this proposed two key redistribution schemes: the q-composite key predistribution scheme and the random pairwise key technique In q-composite key pre-distribution scheme two ...
doi:10.32628/cseit21715
fatcat:kza4wlwm3zerzmxszjqo4hujge
Establishing Pairwise Keys Using Key Predistribution Schemes For Sensor Networks
2015
Zenodo
schemes if used in wireless sensor networks with mobile sinks. ...
Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. ...
The common secret key is the hash of the Q common keys. [5] Proposed a probabilistic generation key predistribution scheme based on the random key distribution for heterogeneous sensor networks. ...
doi:10.5281/zenodo.1107335
fatcat:vqiv4plghngo7bijcizsca2bmm
OVERVIEW ON KEY DISTRIBUTION PRIMITIVES IN WIRELESS SENSOR NETWORK
2013
Journal of Computer Science
It is obvious to evaluate the efficiency of symmetric key management schemes for WSN, since it is not feasible to use traditional key management techniques such as asymmetric key cryptosystem and Key Distribution ...
Owing to the security requirements of wireless sensor network, the background of Wireless Sensor Network (WSN) is to be analyzed with different threats and attack models. ...
CONCLUSION In this study, we have taken a survey on various key predistribution schemes for Distributed Wireless Sensor Network (DWSN). ...
doi:10.3844/jcssp.2013.543.550
fatcat:gk3iuxcahjdhbdiyoudrgfo3ym
Security Architecture and Requirements for Wireless Sensor Networks
2016
International Journal of Security and Its Applications
Recently, with the wider application and development of wireless sensor networks (WSNs), security issues become essential for many sensor network applications including environment monitoring, traffic ...
Which benefit researchers greatly to realizing the situation and trend of state-of-the-art of wireless sensor networks security. ...
Acknowledgements This paper is a revised and expanded version of a paper entitled "Study on Security Issues in Wireless Sensor Network" presented at CIA 2016 Philippines, May 19-21. ...
doi:10.14257/ijsia.2016.10.8.25
fatcat:ysuk7bvs3bgm3ja62bqznqrdty
Enhanced Three Tier Security Architecture for WSN Against Mobile Sink Replication Attacks Using Mutual Authentication Scheme
2013
International Journal of Wireless & Mobile Networks
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a small fraction of sensor nodes by the attacker. ...
The previous system used the polynomial key pre distribution scheme for the sensor networks which handles sink mobility and continuous data delivery to the neighbouring nodes and sinks, but this scheme ...
In the basic probabilistic and q-composite key pre distribution schemes, the attacker gain the control of entire network by deploying a replicated mobile sink preloaded with some compromised keys. ...
doi:10.5121/ijwmn.2013.5207
fatcat:a23olupyrfcrrhz7g7rzbsq53q
A Key Re-Distribution and Authentication Based Technique for Secured Communication in Clustered Wireless Sensor Networks with Node Mobility
2010
International Journal of Computer Networks & Communications
Recent research shows that pre-loading symmetric keys into sensors before they are deployed is a practical method to deal with the key distribution and management problem in wireless sensor networking ...
In master-key approach, even one single node's capture could compromise the entire network, which is unacceptable for large-scale wireless sensor networks. ...
HANDLING NODE MOBILITY THROUGH KEY RE-DISTRIBUTION AND AUTHENTICATION MODEL
Network Model Typically, a wireless sensor network is composed of a large number of sensor nodes; each sensor node is a small ...
doi:10.5121/ijcnc.2010.2608
fatcat:63swjvnrrnavvaff2qcphg2egi
A new key establishment scheme for wireless sensor networks
[article]
2010
arXiv
pre-print
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms ...
In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic ...
Actually, node capture attach is the biggest threat in wireless sensor networks. On the area of key establishment for wireless sensor networks, several key pre-distribution schemes are very popular. ...
arXiv:1004.0591v1
fatcat:e5v6bd4i2rfhzhanlgxljeg6lq
Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network
2021
Wireless Communications and Mobile Computing
In this paper, we proposed a scalable and storage efficient key management scheme (SSEKMS) for wireless sensor networks that establish the three types of keys for the network: a network key that is shared ...
In wireless sensor network, it is very difficult to manage the keys as this includes distribution of key, generation of new session key as per requirements, and renewal or revoke the keys in case of attacks ...
When key setup is completed, a connected graph is created. Two nodes consider as connected if they have a one common key or q common key for q-composite scheme [21] . ...
doi:10.1155/2021/5512879
doaj:22e7b4fa257a42ae8e3a7a584b80c0d9
fatcat:xy4vo6chkbb3jgivovgtnnq5pq
Two Improvements of Random Key Predistribution for Wireless Sensor Networks
[chapter]
2013
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Journal of
Cryptology, 12(1):1-28, (1999)
[Ren et al. 2006] Ren, K., Zeng, K., Lou, W.: A new approach for
random key pre-distribution in large-scale wireless sensor networks. ...
ACM, New York (2002)
[Chan et al. 2003] Chan, H., Perrig, A., Song, D.: Random key
predistribution schemes for sensor networks. ...
doi:10.1007/978-3-642-36883-7_5
fatcat:nkptuwfkcjhnvdby5yvf37d5aa
An Efficient Novel Key management scheme using NchooseK algorithm for Wireless Sensor Networks
2012
International Journal of Computer Networks & Communications
In Wireless Sensor Networks Key Management is a very challenging phenomenon. ...
This paper gives an illustration and demonstration of mathematical model of new key management scheme which overcomes the limitation of Pre-Shared key scheme, which is extensively used in wireless sensor ...
[6] Figure.1 Example of Eschenauer and Gligor's method [6] 2.2 q-Composite key pre-distribution scheme [3] q-Composite scheme can be thought of as a natural extension of Eschenauer and Gligor's ...
doi:10.5121/ijcnc.2012.4610
fatcat:mew7or6nd5ey7a7mdubirl4kuq
An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks
2008
International Journal of Network Security
In this paper, we propose a new random key pre-distribution scheme which is based on the identity-based approach for key establishment between two neighbor nodes in wireless sensor networks. ...
Key establishment in sensor networks is a challenging problem because of resource constraints of the sensors. The classical public-key routines are impractical in most sensor network architectures. ...
Conclusion In this paper, we propose a new scheme for random key pre-distribution in sensor networks. ...
dblp:journals/ijnsec/Das08
fatcat:2suvxnv66vhkpmsig42src3o2u
Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks
2012
International Journal of Network Security
We then propose an improved version of our scheme in a large-scale hierarchical wireless sensor network. ...
The improved IBPRF approach further supports a large-scale sensor network for the network connectivity. ...
Acknowledgments The author would like to thank the anonymous reviewers for their valuable comments and suggestions which have improved significantly the content and the presentation of this paper. ...
dblp:journals/ijnsec/Das12
fatcat:dpyxa7vlr5fqlfhn2f2eqz7g3a
« Previous
Showing results 1 — 15 out of 4,723 results