A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Random key pre-distribution with transitory master key for wireless sensor networks
2009
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies - Co-Next Student Workshop '09
Furthermore, random pre-distribution allows recovering secure communication also when the master key has been compromised. ...
This paper presents a new key management scheme based on Random Key Pre-Distribution. ...
We propose a new Random Key Distribution scheme with Transitory Master Key. As in a standard Random Key Distribution scheme, each node receives a ring of keys randomly picked from a pool. ...
doi:10.1145/1658997.1659012
dblp:conf/conext/GandinoMR09
fatcat:g2q4uq4arndinbihdaprt6xizm
A Hybrid Key Management Approach for Secure Communication in Wireless Sensor Networks
2015
Indian Journal of Science and Technology
To handle such problems, random seed distribution with transitory cluster key, a hybrid approach is used which is the integration of both random key distribution and the transitory master key. ...
Many FPWK schemes such as Random Key Distribution (RKD) in which keys are randomly distributed to each node that has been selected from the pool, Transitory Master Key (TMK) in which the data is encrypted ...
transitory master key for hierarchical clustered sensor networks. ...
doi:10.17485/ijst/2015/v8i15/57603
fatcat:3nbdwkhwencrxjq523a3yd44uq
Security Architecture and Requirements for Wireless Sensor Networks
2016
International Journal of Security and Its Applications
Recently, with the wider application and development of wireless sensor networks (WSNs), security issues become essential for many sensor network applications including environment monitoring, traffic ...
Which benefit researchers greatly to realizing the situation and trend of state-of-the-art of wireless sensor networks security. ...
Acknowledgements This paper is a revised and expanded version of a paper entitled "Study on Security Issues in Wireless Sensor Network" presented at CIA 2016 Philippines, May 19-21. ...
doi:10.14257/ijsia.2016.10.8.25
fatcat:ysuk7bvs3bgm3ja62bqznqrdty
Light Weight Key Establishment Scheme for Wireless Sensor Networks
[chapter]
2016
Lecture Notes in Computer Science
Random key pre-distribution 2 Generate a key pool of size p Load each node with a key ring composed of r keys randomly chosen from the key pool(r < p) If any two neighbouring nodes share secret key, then ...
Gligor, A key management scheme for distributed sensor networks, in Proc. 9th ACM Conf. Comput. Commun. Security, 2002, pp. 41-47. 3 D.Liu, P. Ning, R. ...
doi:10.1007/978-3-319-49445-6_7
fatcat:6rtcgkr22va7vel57t5oogjlda
An efficient key distribution scheme for heterogeneous sensor networks
2007
Proceedings of the 2007 international conference on Wireless communications and mobile computing - IWCMC '07
In this paper, we propose a key distribution scheme based on random key pre-distribution for heterogeneous sensor network (HSN) to achieve better performance and security as compared to homogeneous network ...
In a wireless sensor network, pre-distribution of secret keys is possibly the most practical approach to protect network communications but it is difficult due to the ad hoc nature, intermittent connectivity ...
[17] propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous sensor nodes. ...
doi:10.1145/1280940.1281023
dblp:conf/iwcmc/HussainKM07
fatcat:6ljofrs76naz3cyxsxsunx7q54
Integration of Wireless Sensor Networks in Environmental Monitoring Cyber Infrastructure
2022
International Journal for Research in Applied Science and Engineering Technology
We present a novel environmental monitoring system with a focus on overall system architecture for seamless integration of wired and wireless sensors for long-term, remote, and near-real-time monitoring ...
Abstract: Wireless sensor networks (WSNs) have great potential to revolutionize many science and engineering domains. ...
, plain text key exchange schemes, and transitory master key schemes. ...
doi:10.22214/ijraset.2022.46036
fatcat:nwhtdyl5hfalnjdnpvqaqyxng4
A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks
2021
SN Applied Sciences
One of the active areas of research is key management, authentication, and trust management in wireless sensor networks (WSN). ...
AbstractWireless sensor networks (WSN) are the new speed-accelerating technologies worldwide and are used continuously in a range of critical applications. ...
The LEAP+ scheme is to produce keys by using the transitory key. The transitory key is the combination of the master key and ID of the nodes. ...
doi:10.1007/s42452-020-04089-9
fatcat:ioaq4ud5sfgvlk3bayjfzpddv4
SMART: Secure Multi-pAths Routing for wireless sensor neTworks
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we propose a novel secure routing protocol named Secure Multi-pAths Routing for wireless sensor neTworks (SMART) as well as its underlying key management scheme named Extended Twohop Keys ...
Key setup phase Each node u is preloaded with a transitory initial key K IN and a random number N u . ...
To achieve key agreement between communicated nodes, the pre-distribution method is more suitable for WSN [8] . ...
doi:10.1007/978-3-319-07425-2_25
fatcat:bdbtxxzcijajbgvsxo6gp2dshm
An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks
[chapter]
2008
Lecture Notes in Electrical Engineering
In this paper we propose an authenticated key management (AKM) scheme for hierarchical networks based on the random key pre-distribution. Further, a secure cluster formation algorithm is proposed. ...
The AKM scheme is more resilient to node capture as compared to other random key pre-distribution schemes. ...
, plain text key exchange schemes, and transitory master key schemes. ...
doi:10.1007/978-0-387-74938-9_7
fatcat:mu23g77a2vdi5fgssljfviyzfe
Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs
2013
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. ...
The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks. ...
Thank you to the officials and senior researchers at Center of Excellence in Information Assurance (CoEIA), King Saud University (KSU) for their invaluable help and guidance. ...
doi:10.1109/trustcom.2013.206
dblp:conf/trustcom/SaleemKFAO13
fatcat:oupqlgd6zfaixao2mglodpnite
OPTIMAL CLUSTER BASED KEY MANAGEMENT SYSTEM USING SIGNCRYPTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
2018
Neural Network World
A group key management protocol [13] for hierarchical sensor networks have developed from pre-deployed keys, each sensor node generates a partial key dynamically using a function. ...
A classical random key management and distribution scheme for WSNs are Eschenauer, Du, LEAP, SHELL, and Panja [41] . ...
[26] have presented an innovative key management scheme, named as random seed distribution with transitory master key, which adopts the random distribution of secret material and a transitory master ...
doi:10.14311/nnw.2018.28.024
fatcat:lgfk4rpnhngv5hxdega27wcs4u
A Novel Technique for Improving the Security of WSN Using Random Key PreDistribution Scheme
2019
International Journal of Intelligent Engineering and Systems
Secure mechanisms are widely in Wireless Sensor Networks (WSNs), not only for improving the network energy consumption and lifetime, it also improves the security between the networked Sensor Nodes (SNs ...
In this paper, a Random Key Predistribution (RKP) scheme is used in Low-Energy Adaptive Clustering Hierarchy (LEACH) based clustered network. ...
Additionally, the random key pre-distribution scheme is developed for providing the keys to each nodes for making the secured network. ...
doi:10.22266/ijies2019.0430.04
fatcat:23po7wsf7rezfltowyeymehnsa
A Security Key Management Method using Grid Routing for EDDK in WSNs
2019
International journal of recent technology and engineering
Wireless sensor networks (WSNs) utilize event data collected through sensor nodes, which can be employed in different environments. ...
Experimental results show that the energy efficiency of the sensor network is improved by about 7.8097% compared with EDDK. ...
SN a and SN b are random numbers generated by each sensor node to distribute the pairwise key. ...
doi:10.35940/ijrte.b2529.078219
fatcat:3r57rgmrwfhjzlat7kne6wfxmm
Scalable and efficient key management for heterogeneous sensor networks
2008
Journal of Supercomputing
In this paper, we propose a key management scheme based on random key predistribution for heterogeneous wireless sensor networks (HSNs). ...
As typical wireless sensor networks (WSNs) have resource limitations, predistribution of secret keys is possibly the most practical approach for secure network communications. ...
[23] propose a framework for key management schemes in distributed wireless sensor networks with heterogeneous sensor nodes. Traynor et al. ...
doi:10.1007/s11227-008-0184-2
fatcat:sdfvhxasg5aqtng7gtitinscbi
INSENS: Intrusion-tolerant routing for wireless sensor networks
2006
Computer Communications
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). ...
INSENS securely and efficiently constructs tree-structured routing for wireless sensor networks (WSNs). ...
One way to establish pairwise key between neighbor nodes is to use random pre-distributed pairwise key schemes [16, 9, 21, 15] . ...
doi:10.1016/j.comcom.2005.05.018
fatcat:25swybzilvcrzlpzsyovkcnj3y
« Previous
Showing results 1 — 15 out of 147 results