Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








147 Hits in 4.5 sec

Random key pre-distribution with transitory master key for wireless sensor networks

Filippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo
2009 Proceedings of the 5th international student workshop on Emerging networking experiments and technologies - Co-Next Student Workshop '09  
Furthermore, random pre-distribution allows recovering secure communication also when the master key has been compromised.  ...  This paper presents a new key management scheme based on Random Key Pre-Distribution.  ...  We propose a new Random Key Distribution scheme with Transitory Master Key. As in a standard Random Key Distribution scheme, each node receives a ring of keys randomly picked from a pool.  ... 
doi:10.1145/1658997.1659012 dblp:conf/conext/GandinoMR09 fatcat:g2q4uq4arndinbihdaprt6xizm

A Hybrid Key Management Approach for Secure Communication in Wireless Sensor Networks

R. Geetha, E. Kannan
2015 Indian Journal of Science and Technology  
To handle such problems, random seed distribution with transitory cluster key, a hybrid approach is used which is the integration of both random key distribution and the transitory master key.  ...  Many FPWK schemes such as Random Key Distribution (RKD) in which keys are randomly distributed to each node that has been selected from the pool, Transitory Master Key (TMK) in which the data is encrypted  ...  transitory master key for hierarchical clustered sensor networks.  ... 
doi:10.17485/ijst/2015/v8i15/57603 fatcat:3nbdwkhwencrxjq523a3yd44uq

Security Architecture and Requirements for Wireless Sensor Networks

Yiguang Gong, Feng Ruan, Zhiyong Fan, Jianmin Hou, Ping Mei, Tao Li
2016 International Journal of Security and Its Applications  
Recently, with the wider application and development of wireless sensor networks (WSNs), security issues become essential for many sensor network applications including environment monitoring, traffic  ...  Which benefit researchers greatly to realizing the situation and trend of state-of-the-art of wireless sensor networks security.  ...  Acknowledgements This paper is a revised and expanded version of a paper entitled "Study on Security Issues in Wireless Sensor Network" presented at CIA 2016 Philippines, May 19-21.  ... 
doi:10.14257/ijsia.2016.10.8.25 fatcat:ysuk7bvs3bgm3ja62bqznqrdty

Light Weight Key Establishment Scheme for Wireless Sensor Networks [chapter]

Payingat Jilna, P. P. Deepthi
2016 Lecture Notes in Computer Science  
Random key pre-distribution 2 Generate a key pool of size p Load each node with a key ring composed of r keys randomly chosen from the key pool(r < p) If any two neighbouring nodes share secret key, then  ...  Gligor, A key management scheme for distributed sensor networks, in Proc. 9th ACM Conf. Comput. Commun. Security, 2002, pp. 41-47. 3 D.Liu, P. Ning, R.  ... 
doi:10.1007/978-3-319-49445-6_7 fatcat:6rtcgkr22va7vel57t5oogjlda

An efficient key distribution scheme for heterogeneous sensor networks

Sajid Hussain, Firdous Kausar, Ashraf Masood
2007 Proceedings of the 2007 international conference on Wireless communications and mobile computing - IWCMC '07  
In this paper, we propose a key distribution scheme based on random key pre-distribution for heterogeneous sensor network (HSN) to achieve better performance and security as compared to homogeneous network  ...  In a wireless sensor network, pre-distribution of secret keys is possibly the most practical approach to protect network communications but it is difficult due to the ad hoc nature, intermittent connectivity  ...  [17] propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous sensor nodes.  ... 
doi:10.1145/1280940.1281023 dblp:conf/iwcmc/HussainKM07 fatcat:6ljofrs76naz3cyxsxsunx7q54

Integration of Wireless Sensor Networks in Environmental Monitoring Cyber Infrastructure

C. Nithya Praba, Dr. D. Kalaivani
2022 International Journal for Research in Applied Science and Engineering Technology  
We present a novel environmental monitoring system with a focus on overall system architecture for seamless integration of wired and wireless sensors for long-term, remote, and near-real-time monitoring  ...  Abstract: Wireless sensor networks (WSNs) have great potential to revolutionize many science and engineering domains.  ...  , plain text key exchange schemes, and transitory master key schemes.  ... 
doi:10.22214/ijraset.2022.46036 fatcat:nwhtdyl5hfalnjdnpvqaqyxng4

A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

Amit Kumar Gautam, Rakesh Kumar
2021 SN Applied Sciences  
One of the active areas of research is key management, authentication, and trust management in wireless sensor networks (WSN).  ...  AbstractWireless sensor networks (WSN) are the new speed-accelerating technologies worldwide and are used continuously in a range of critical applications.  ...  The LEAP+ scheme is to produce keys by using the transitory key. The transitory key is the combination of the master key and ID of the nodes.  ... 
doi:10.1007/s42452-020-04089-9 fatcat:ioaq4ud5sfgvlk3bayjfzpddv4

SMART: Secure Multi-pAths Routing for wireless sensor neTworks [chapter]

Noureddine Lasla, Abdelouahid Derhab, Abdelraouf Ouadjaout, Miloud Bagaa, Yacine Challal
2014 Lecture Notes in Computer Science  
In this paper, we propose a novel secure routing protocol named Secure Multi-pAths Routing for wireless sensor neTworks (SMART) as well as its underlying key management scheme named Extended Twohop Keys  ...  Key setup phase Each node u is preloaded with a transitory initial key K IN and a random number N u .  ...  To achieve key agreement between communicated nodes, the pre-distribution method is more suitable for WSN [8] .  ... 
doi:10.1007/978-3-319-07425-2_25 fatcat:bdbtxxzcijajbgvsxo6gp2dshm

An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks [chapter]

Firdous Kausar, Ashraf Masood, Sajid Hussain
2008 Lecture Notes in Electrical Engineering  
In this paper we propose an authenticated key management (AKM) scheme for hierarchical networks based on the random key pre-distribution. Further, a secure cluster formation algorithm is proposed.  ...  The AKM scheme is more resilient to node capture as compared to other random key pre-distribution schemes.  ...  , plain text key exchange schemes, and transitory master key schemes.  ... 
doi:10.1007/978-0-387-74938-9_7 fatcat:mu23g77a2vdi5fgssljfviyzfe

Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs

Kashif Saleem, Mohammed Sayim Khalil, Norsheila Fisal, Adel Ali Ahmed, Mehmet Ali Orgun
2013 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  
Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources.  ...  The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks.  ...  Thank you to the officials and senior researchers at Center of Excellence in Information Assurance (CoEIA), King Saud University (KSU) for their invaluable help and guidance.  ... 
doi:10.1109/trustcom.2013.206 dblp:conf/trustcom/SaleemKFAO13 fatcat:oupqlgd6zfaixao2mglodpnite

OPTIMAL CLUSTER BASED KEY MANAGEMENT SYSTEM USING SIGNCRYPTION ALGORITHM FOR WIRELESS SENSOR NETWORKS

G. Manikandan, U. Sakthi
2018 Neural Network World  
A group key management protocol [13] for hierarchical sensor networks have developed from pre-deployed keys, each sensor node generates a partial key dynamically using a function.  ...  A classical random key management and distribution scheme for WSNs are Eschenauer, Du, LEAP, SHELL, and Panja [41] .  ...  [26] have presented an innovative key management scheme, named as random seed distribution with transitory master key, which adopts the random distribution of secret material and a transitory master  ... 
doi:10.14311/nnw.2018.28.024 fatcat:lgfk4rpnhngv5hxdega27wcs4u

A Novel Technique for Improving the Security of WSN Using Random Key PreDistribution Scheme

Vijay Krishnappa, Suresh Narayanagowda
2019 International Journal of Intelligent Engineering and Systems  
Secure mechanisms are widely in Wireless Sensor Networks (WSNs), not only for improving the network energy consumption and lifetime, it also improves the security between the networked Sensor Nodes (SNs  ...  In this paper, a Random Key Predistribution (RKP) scheme is used in Low-Energy Adaptive Clustering Hierarchy (LEACH) based clustered network.  ...  Additionally, the random key pre-distribution scheme is developed for providing the keys to each nodes for making the secured network.  ... 
doi:10.22266/ijies2019.0430.04 fatcat:23po7wsf7rezfltowyeymehnsa

A Security Key Management Method using Grid Routing for EDDK in WSNs

2019 International journal of recent technology and engineering  
Wireless sensor networks (WSNs) utilize event data collected through sensor nodes, which can be employed in different environments.  ...  Experimental results show that the energy efficiency of the sensor network is improved by about 7.8097% compared with EDDK.  ...  SN a and SN b are random numbers generated by each sensor node to distribute the pairwise key.  ... 
doi:10.35940/ijrte.b2529.078219 fatcat:3r57rgmrwfhjzlat7kne6wfxmm

Scalable and efficient key management for heterogeneous sensor networks

Firdous Kausar, Sajid Hussain, Laurence T. Yang, Ashraf Masood
2008 Journal of Supercomputing  
In this paper, we propose a key management scheme based on random key predistribution for heterogeneous wireless sensor networks (HSNs).  ...  As typical wireless sensor networks (WSNs) have resource limitations, predistribution of secret keys is possibly the most practical approach for secure network communications.  ...  [23] propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous sensor nodes. Traynor et al.  ... 
doi:10.1007/s11227-008-0184-2 fatcat:sdfvhxasg5aqtng7gtitinscbi

INSENS: Intrusion-tolerant routing for wireless sensor networks

Jing Deng, Richard Han, Shivakant Mishra
2006 Computer Communications  
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS).  ...  INSENS securely and efficiently constructs tree-structured routing for wireless sensor networks (WSNs).  ...  One way to establish pairwise key between neighbor nodes is to use random pre-distributed pairwise key schemes [16, 9, 21, 15] .  ... 
doi:10.1016/j.comcom.2005.05.018 fatcat:25swybzilvcrzlpzsyovkcnj3y
« Previous Showing results 1 — 15 out of 147 results