Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4,723 Hits in 5.7 sec

Securing Wireless Sensor Network using Intelligent Techniques

K. Priyadharshini, G. Hemalatha, K. Selvamani
2013 International Journal of Computer Applications  
In the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of the network sensor nodes.  ...  To address this issue a general framework needs to be developed that permits the use of any pair wise key pre distribution scheme which requires two separate key pools one for the mobile sink to access  ...  thanks to all the staff member of the Department of Computer Science and Engineering, GKM College of Engineering and technology and College of Engineering, Guindy Campus, Anna University, Chennai -600 025 for  ... 
doi:10.5120/12164-7784 fatcat:befs3sl4wvfmpeikc67lg7s3tq

Authentication and Integrity of Data in Wireless Sensor Network with Mobile Sink

P. M.Kakade, V. V. Kimbahune
2013 International Journal of Computer Applications  
The basic work in it is that to allow a three-tier general framework, use of any pair wise key pre-distribution scheme.  ...  Traditional techniques are used for keys pre-distributed among the sinks and sensors for pair wise key establishment and authentication.  ...  The Q-composite key predistribution scheme also uses a key pool but requires two sensor nodes compute a pair wise key from at least Q predistributed keys they share.  ... 
doi:10.5120/14472-2766 fatcat:4zj7dd35njhzrfh2ck3zyeic7i

Hash Chain based Key Management for Mobile Heterogeneous Sensor Network

Vipin Kumar, Priyanka Ahlawat
2013 International Journal of Computer Applications  
Key management is an important issue for wireless sensor networks because sensors have limited resources as memory, processing speed and battery power.  ...  Key management is one of the basic building blocks of sensor network security. Many protocol presented before didn't take much attention on mobility of node.  ...  ., [9] proposed a unified framework for distributed key management schemes in heterogeneous wireless sensor networks.  ... 
doi:10.5120/12113-8402 fatcat:pfzm22so7zfijlxosddvnxwg6a

Efficient Resource Allocation in Hybrid Wireless Networks Increase the Capacity

B. Senbagappriya, S. S. Dhenakaran
2021 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
In many wireless sensor network (WSN) the Mobile sinks(MSs) are very essential applications for efficient data gathering, restricted sensor reprogramming, and for distinguishing and revoking compromised  ...  In this project we implemented a new technique with an algorithm named GNDA Good Node Detection Algorithm Based Approach technique with Wireless Sensor Networks.  ...  [2] present unmitigated this proposed two key redistribution schemes: the q-composite key predistribution scheme and the random pairwise key technique In q-composite key pre-distribution scheme two  ... 
doi:10.32628/cseit21715 fatcat:kza4wlwm3zerzmxszjqo4hujge

Establishing Pairwise Keys Using Key Predistribution Schemes For Sensor Networks

Y. Harold Robinson, M. Rajaram
2015 Zenodo  
schemes if used in wireless sensor networks with mobile sinks.  ...  Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices.  ...  The common secret key is the hash of the Q common keys. [5] Proposed a probabilistic generation key predistribution scheme based on the random key distribution for heterogeneous sensor networks.  ... 
doi:10.5281/zenodo.1107335 fatcat:vqiv4plghngo7bijcizsca2bmm

OVERVIEW ON KEY DISTRIBUTION PRIMITIVES IN WIRELESS SENSOR NETWORK

Raghini
2013 Journal of Computer Science  
It is obvious to evaluate the efficiency of symmetric key management schemes for WSN, since it is not feasible to use traditional key management techniques such as asymmetric key cryptosystem and Key Distribution  ...  Owing to the security requirements of wireless sensor network, the background of Wireless Sensor Network (WSN) is to be analyzed with different threats and attack models.  ...  CONCLUSION In this study, we have taken a survey on various key predistribution schemes for Distributed Wireless Sensor Network (DWSN).  ... 
doi:10.3844/jcssp.2013.543.550 fatcat:gk3iuxcahjdhbdiyoudrgfo3ym

Security Architecture and Requirements for Wireless Sensor Networks

Yiguang Gong, Feng Ruan, Zhiyong Fan, Jianmin Hou, Ping Mei, Tao Li
2016 International Journal of Security and Its Applications  
Recently, with the wider application and development of wireless sensor networks (WSNs), security issues become essential for many sensor network applications including environment monitoring, traffic  ...  Which benefit researchers greatly to realizing the situation and trend of state-of-the-art of wireless sensor networks security.  ...  Acknowledgements This paper is a revised and expanded version of a paper entitled "Study on Security Issues in Wireless Sensor Network" presented at CIA 2016 Philippines, May 19-21.  ... 
doi:10.14257/ijsia.2016.10.8.25 fatcat:ysuk7bvs3bgm3ja62bqznqrdty

Enhanced Three Tier Security Architecture for WSN Against Mobile Sink Replication Attacks Using Mutual Authentication Scheme

Linciya T, Anandkumar K.M
2013 International Journal of Wireless & Mobile Networks  
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a small fraction of sensor nodes by the attacker.  ...  The previous system used the polynomial key pre distribution scheme for the sensor networks which handles sink mobility and continuous data delivery to the neighbouring nodes and sinks, but this scheme  ...  In the basic probabilistic and q-composite key pre distribution schemes, the attacker gain the control of entire network by deploying a replicated mobile sink preloaded with some compromised keys.  ... 
doi:10.5121/ijwmn.2013.5207 fatcat:a23olupyrfcrrhz7g7rzbsq53q

A Key Re-Distribution and Authentication Based Technique for Secured Communication in Clustered Wireless Sensor Networks with Node Mobility

Saswati Mukherjee, Matangini Chattopadhyay, Samiran Chattopadhyay, Amrita Saha
2010 International Journal of Computer Networks & Communications  
Recent research shows that pre-loading symmetric keys into sensors before they are deployed is a practical method to deal with the key distribution and management problem in wireless sensor networking  ...  In master-key approach, even one single node's capture could compromise the entire network, which is unacceptable for large-scale wireless sensor networks.  ...  HANDLING NODE MOBILITY THROUGH KEY RE-DISTRIBUTION AND AUTHENTICATION MODEL Network Model Typically, a wireless sensor network is composed of a large number of sensor nodes; each sensor node is a small  ... 
doi:10.5121/ijcnc.2010.2608 fatcat:63swjvnrrnavvaff2qcphg2egi

A new key establishment scheme for wireless sensor networks [article]

Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu, (The University of Hong Kong, Hong Kong)
2010 arXiv   pre-print
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms  ...  In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic  ...  Actually, node capture attach is the biggest threat in wireless sensor networks. On the area of key establishment for wireless sensor networks, several key pre-distribution schemes are very popular.  ... 
arXiv:1004.0591v1 fatcat:e5v6bd4i2rfhzhanlgxljeg6lq

Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network

Vipin Kumar, Navneet Malik, Gaurav Dhiman, Tarun Kumar Lohani
2021 Wireless Communications and Mobile Computing  
In this paper, we proposed a scalable and storage efficient key management scheme (SSEKMS) for wireless sensor networks that establish the three types of keys for the network: a network key that is shared  ...  In wireless sensor network, it is very difficult to manage the keys as this includes distribution of key, generation of new session key as per requirements, and renewal or revoke the keys in case of attacks  ...  When key setup is completed, a connected graph is created. Two nodes consider as connected if they have a one common key or q common key for q-composite scheme [21] .  ... 
doi:10.1155/2021/5512879 doaj:22e7b4fa257a42ae8e3a7a584b80c0d9 fatcat:xy4vo6chkbb3jgivovgtnnq5pq

Two Improvements of Random Key Predistribution for Wireless Sensor Networks [chapter]

Jiří Kůr, Vashek Matyáš, Petr Švenda
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Journal of Cryptology, 12(1):1-28, (1999) [Ren et al. 2006] Ren, K., Zeng, K., Lou, W.: A new approach for random key pre-distribution in large-scale wireless sensor networks.  ...  ACM, New York (2002) [Chan et al. 2003] Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks.  ... 
doi:10.1007/978-3-642-36883-7_5 fatcat:nkptuwfkcjhnvdby5yvf37d5aa

An Efficient Novel Key management scheme using NchooseK algorithm for Wireless Sensor Networks

Harjot Bawa
2012 International Journal of Computer Networks & Communications  
In Wireless Sensor Networks Key Management is a very challenging phenomenon.  ...  This paper gives an illustration and demonstration of mathematical model of new key management scheme which overcomes the limitation of Pre-Shared key scheme, which is extensively used in wireless sensor  ...  [6] Figure.1 Example of Eschenauer and Gligor's method [6] 2.2 q-Composite key pre-distribution scheme [3] q-Composite scheme can be thought of as a natural extension of Eschenauer and Gligor's  ... 
doi:10.5121/ijcnc.2012.4610 fatcat:mew7or6nd5ey7a7mdubirl4kuq

An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks

Ashok Kumar Das
2008 International Journal of Network Security  
In this paper, we propose a new random key pre-distribution scheme which is based on the identity-based approach for key establishment between two neighbor nodes in wireless sensor networks.  ...  Key establishment in sensor networks is a challenging problem because of resource constraints of the sensors. The classical public-key routines are impractical in most sensor network architectures.  ...  Conclusion In this paper, we propose a new scheme for random key pre-distribution in sensor networks.  ... 
dblp:journals/ijnsec/Das08 fatcat:2suvxnv66vhkpmsig42src3o2u

Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks

Ashok Kumar Das
2012 International Journal of Network Security  
We then propose an improved version of our scheme in a large-scale hierarchical wireless sensor network.  ...  The improved IBPRF approach further supports a large-scale sensor network for the network connectivity.  ...  Acknowledgments The author would like to thank the anonymous reviewers for their valuable comments and suggestions which have improved significantly the content and the presentation of this paper.  ... 
dblp:journals/ijnsec/Das12 fatcat:dpyxa7vlr5fqlfhn2f2eqz7g3a
« Previous Showing results 1 — 15 out of 4,723 results