8,132 Hits in 8.5 sec

Energy Efficient and Secured Key Based Management in Area Monitor by WSN

Popular Technology for monitoring Environment, observation of battle field, caring of health, tracking of object, managing during various types of attack is by Wireless sensor networks.  ...  A security mechanism of our scheme shows that our protocol is effective in defending against radiation attack and intentionally node attacked hackers.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous referees and the editor for their constructive comments and valuable suggestions which have helped improve the quality and presentation of the  ... 
doi:10.35940/ijitee.j1027.08810s19 fatcat:6rgnojnoubh7bpo4rsssdev25i

Hybrid Key Management Scheme for Wireless Sensor Networks

R Sharmila, V Vijayalakshmi
2015 International Journal of Security and Its Applications  
Many key management schemes have been proposed in systematically deployed Wireless Sensor Networks (WSNs).The sensor nodes are equipped with inadequate battery power, low memory, limited computation and  ...  Energy efficient secure routing is major issue in wireless sensor networks.  ...  (2009) proposed a GA based key management scheme for hierarchical wireless sensor networks [4] .  ... 
doi:10.14257/ijsia.2015.9.11.13 fatcat:bgbfnlnctva6ne22snrgptfuee

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016

Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, Jose Maria de Fuentes
2017 Journal of Sensors  
The special issue covers industrial issues/applications and academic research into security and privacy for wireless sensor networks.  ...  However, providing satisfactory security protection in wireless sensor networks has ever been a challenging task due to various network and resource constraints and malicious attacks.  ...  their thorough reviews under a tight time schedule.  ... 
doi:10.1155/2017/3057534 fatcat:y2x5fqe7lbhyfh5fo3lha63w2e

A Review on Secure Group Key Management Schemes for Data Gathering in Wireless Sensor Networks

M. B. Apsara, P. Dayananda, C. N. Sowmyarani
2020 Zenodo  
A survey is conducted on the key management schemes of WSNs.  ...  WSNs are more vulnerable to attacks due to their ad hoc nature, so the design of a good key management scheme to provide security is necessary.  ...  Dayananda Apsara et al.: A Review on Secure Group Key Management Schemes for Data Gathering in Wireless … Fig. 1.  ... 
doi:10.5281/zenodo.3659495 fatcat:cs6im6tqsjaepgo4lndbxpqh3q

Survey on Security Improvement using Wireless Sensor Networks

R. Santhosh, M. Shalini
2017 International Journal of Computer Applications  
Drawbacks like security vulnerabilities are associated with those schemes. In this paper a survey is taken related to the security purpose.  ...  Implementation of security for wsn influence a great deal due to their size and energy limitations.To rectify these drawbacks chaotic maps and genetic operations are used.  ...  Using public key cryptographic scheme, session key is delivered among sensor nodes in order to improve the network security and also to use less amount of energy.  ... 
doi:10.5120/ijca2017913428 fatcat:ediptoovm5bqxgnhpk5gfgj3de

Virtual Energy Based Encryption & Keying on Wireless Sensor Network

Aditya Shukla
2013 IOSR Journal of Computer Engineering  
Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this we  ...  introduce an energy-efficient Virtual Energy-Based Encryption and Keying(VEBEK) scheme for WSNs that reduces the number of transmission needed for rekeying the packets.  ...  Another note regarding symmetric security primitives is the need of having a key management system (KMS) for constructing a secure key infrastructure.  ... 
doi:10.9790/0661-0933443 fatcat:ffhgpdwgpfaqtfxgq7isihcoey

SARDS: Secured Anonymous Routing with Digital Signature in Wireless Sensor Network

H. R. Roopashree, Anita Kanavalli
2016 Indian Journal of Science and Technology  
Objectives: Our objective is to use public key cryptography for ensuring energy-efficient routing technique in Wireless Sensor Network.  ...  Application/Improvements: Proposed SARDS technique offers 1) A novel public key encryption, 2) A novel digital signature scheme, and 3) A novel privacy or anonymous scheme.  ...  Most reference 6 has suggested a method to improve encryption key management in Wireless Sensor Network. The authors have also used hashing technique for minimizing the latency.  ... 
doi:10.17485/ijst/2016/v9i7/85760 fatcat:oudxtwszafd6dbcq4u7ora6m6a

LT Codes with Double Encoding Matrix Reorder Physical Layer Secure Transmission

Hang Zhang, Fanglin Niu, Ling Yu, Si Zhang, Kashif Naseer
2022 Journal of Sensors  
When it is used for physical layer communication of wireless sensor networks, it ensures that the destination node recovers all the information without adding the key, while the eavesdropping node can  ...  To reduce the intercept efficiency of eavesdropping nodes, a physical layer security (PLS) method of LT codes with double encoding matrix reorder (DEMR-LT codes) is proposed.  ...  Acknowledgments This work was supported by the Project of Science and Technology Plan of Liaoning Province (Grant no. 20180550911).  ... 
doi:10.1155/2022/6106786 fatcat:wx4yprsr6nhc5kurxlfdpgx4ja

A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

Omid Mahdi Ebadati E., Farshad Eshghi, Amin Zamani
2020 CMES - Computer Modeling in Engineering & Sciences  
Cryptographic algorithms have a good role in information security for wireless sensor networks.  ...  In this research, to improve the power of these algorithms, a new hybrid encryption algorithm for monitoring energy transmission lines and increasing the security of wireless sensor networks is proposed  ...  Conflicts of Interest: I hereby declare that there is no conflict of interest related to this manuscript (article) entitled "Fusion of Medical Images in Wavelet Domain: A Hybrid Implementation" with manuscript  ... 
doi:10.32604/cmes.2020.08079 fatcat:thissiwhpvfyzbxf6pvic4n5x4

Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network

Jyothi Metan, K N Narasimha Murthy
2015 International Journal of Computer Applications  
In the recent times the concept of group key management is found to be one of the very essential issues in the field of wireless sensor network.  ...  This paper addresses the security issues associated with the Group key management techniques and ensures some significant conclusions for group key management in cluster tree WSNs.  ...  essential to design a secure channel for secure mode of communication in a wireless sensor network. o Public sensor data, which can be identified where sensor identities the information and public keys  ... 
doi:10.5120/20605-3225 fatcat:pox6sypmrvejzlwtfexbb2iaaa

A polynomial-based key predistribution scheme for wireless sensor networks using matrix decomposition

Hong Zheng, Hangyang Dai
2008 2008 IEEE Conference on Cybernetics and Intelligent Systems  
Key predistribution is one of the most challenging issues for secure communication in wireless sensor networks.  ...  regardless of the number of keys, and it develops an efficient encoding mechanism to optimize the network-wide storage usage.  ...  As the basic requirement for providing security functionality, key management plays a central role in data encryption and authentication.  ... 
doi:10.1109/iccis.2008.4670785 fatcat:2pi5cqc4jrds3cthvrzswyp5yi

Pairing based Encoding Schemes (PBES) for Secure Wireless Sensor Networks

Rohit Vaid, Vijay Katiyar
2013 International Journal of Computer Applications  
There is currently enormous research potential in the field of wireless sensor network security. In this paper, we have presented a pairing based encoding scheme (PBES).  ...  Wireless sensor network (WSN) is also such type of information collecting system which works autonomously with the help of tiny sensors.  ...  Author in [7] presents a Key-Management Scheme for distributed sensor.  ... 
doi:10.5120/12163-8232 fatcat:ohhnju4nhfh3lnzeinjdxiq65q

Securing Wireless Sensor Network using Intelligent Techniques

K. Priyadharshini, G. Hemalatha, K. Selvamani
2013 International Journal of Computer Applications  
The agents play a major role and perform with the idea of knowledge base and rule manager.  ...  the network and other for the pair wise key establishment between the sensors.  ...  , Guindy Campus, Anna University, Chennai -600 025 for their help and co-operation.  ... 
doi:10.5120/12164-7784 fatcat:befs3sl4wvfmpeikc67lg7s3tq

Trust based Data Aggregation in Wireless Sensor Networks

Amrutha Mohanan.K, P. Vijayalakshmi
2013 International Journal of Computer Applications  
The trust based data aggregation scheme is secure and it provides both integrity confidentiality and authenticity for homogeneous and heterogeneous networks and this scheme evaluate the malicious behavior  ...  These data aggregation schemes provide better security compared with traditional aggregation since cluster heads can directly aggregate the cipher texts without decryption.  ...  Hierarchical trust management protocol for clustered wireless sensor networks is useful to detect insider attackers The rest of this paper is organized as follows: Section II deals with the Proposed Scheme  ... 
doi:10.5120/13032-9505 fatcat:dsc3wrbvivh5dof4es6ysxi5t4

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs
무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법

Taehyun Park, Seung Young Kim, Gu-In Kwon
2013 Journal of the Korea Society of Computer and Information  
In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with  ...  This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks  ...  wireless sensor networks.  ... 
doi:10.9708/jksci.2013.18.11.115 fatcat:qbgnknhuj5chvcvosafx3ozisu
« Previous Showing results 1 — 15 out of 8,132 results