The Internet Archive has a preservation copy of this work in our general collections.
The file type is application/pdf
.
Filters
Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks
[article]
2010
arXiv
pre-print
These key predistribution schemes from different random curves can be used for various parts of hierarchical networks. ...
However different and random these KPSs can be used for various parts of the networks for enhancing the resilience. We also presentkey predistribution schemes from a family hyperelliptic curves. ...
Acknowledgment: The work was supported by the National Natural Science Foundation of China Grant 10871068. ...
arXiv:1007.3046v1
fatcat:i2ify3hgorhr5ba2s3tfrjr4pm
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)
2019
Security and Communication Networks
In this paper, we propose a novel polynomial-based scheme with a probabilistic security feature that effectively reduces the security risk of sensor-captured attacks and requires minimal memory and computation ...
Designing a key distribution/establishment scheme in WSNs is a challenging task due to the limited resources of sensor nodes. ...
(vi) It has a hierarchical key management structure, which means it minimizes the storage requirements of each sensor, CH, and the sink. ...
doi:10.1155/2019/3950129
fatcat:lzrwj55m5fakvbrbzmhiex2x2a
Sensor network security: a survey
2009
IEEE Communications Surveys and Tutorials
Then we give a holistic overview of security issues. ...
These issues are divided into seven categories: cryptography, key management, attack detections and preventions, secure routing, secure location security, secure data fusion, and other security issues. ...
Based on the usage of hierarchical structure of sensor networks and symmetric key, they propose a secure routing protocol. ...
doi:10.1109/surv.2009.090205
fatcat:qcm4ieoqwrdl7ezxffdsdfyk3e
SecLEACH—On the security of clustered sensor networks
2007
Signal Processing
We present our solution, and provide a detailed analysis of how different values for the various parameters in such a system impact a hierarchical network in terms of security and energy efficiency. ...
For this purpose, we show how random key predistribution, widely studied in the context of flat networks, and mTESLA, a building block from SPINS, can be both used to secure communications in this type ...
a system. ...
doi:10.1016/j.sigpro.2007.05.016
fatcat:ayiybpwi4rg6dbjp5glkihzpem
Scalable and efficient key management for heterogeneous sensor networks
2008
Journal of Supercomputing
We consider hierarchical HSN consisting of a small number high-end sensors and a large number of low-end sensors. ...
As typical wireless sensor networks (WSNs) have resource limitations, predistribution of secret keys is possibly the most practical approach for secure network communications. ...
Clustering of sensors HSN consists of a hierarchical structure where sensors are divided into clusters and each cluster is managed by a cluster head, as shown in Fig. 1 . ...
doi:10.1007/s11227-008-0184-2
fatcat:sdfvhxasg5aqtng7gtitinscbi
PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks
2021
Security and Communication Networks
Because of the movements of sensor nodes and unknown mobility pattern, how to ensure two communicating (static or mobile) nodes authenticate and share a pairwise key is important. ...
Compared with traditional key predistribution schemes, the proposal reduces the storage overhead and the key exposure risks and thereby improves the resilience against node capture attacks. ...
However, in our work, we consider each PUF structure as a black-box challenge-response system, where a set of challenges are available and the system responds with a set of sufficiently different responses ...
doi:10.1155/2021/5532683
fatcat:mvyp43vh3fbxhagl5zbfr2cceq
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
[article]
2009
arXiv
pre-print
We review and examine the appropriateness of combinatorial designs as a tool for building key predistribution schemes suitable for such environments. ...
The rich mathematical structure of combinatorial designs has resulted in the proposal of several key predistribution schemes for wireless sensor networks based on designs. ...
There has been some debate about the practicality of using public key cryptography to implement security services in a WSN [18] . ...
arXiv:0902.0458v1
fatcat:vpufcfwa5faelic22wq2vnjbsu
Dynamic Resiliency Analysis of Key Predistribution in Wireless Sensor Networks
2009
2009 IEEE International Conference on Communications
Wireless sensor networks have been analyzed for more than a decade from operational and security points of view. Several key predistribution schemes have been proposed in the literature. ...
In this paper, we propose such a dynamic approach to measure the resiliency of key predistribution schemes in sensor networks. ...
Random Key Predistribution and Key Establishment We use Eschenauer and Gligor's [1] EG random key predistribution scheme in our simulations. ...
doi:10.1109/icc.2009.5198959
dblp:conf/icc/DurahimL09
fatcat:ytgbxvkon5bljf2mpfrwfg5jda
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks
2002
Computer journal
The Key Predistribution Systems (KPSs) are a large class of such key sharing schemes. ...
Although KPSs provide common keys for all possible communication links among entities, in practical communication systems most of them will not be necessary. ...
The first author is supported by a Research Fellowship of the JSPS. Part of this research was presented at ASIACRYPT'99 [20] . ...
doi:10.1093/comjnl/45.3.293
fatcat:cwbk454sczfzdecj6u6sq46ari
An Efficient Key Management Scheme for Wireless Sensor Networks
2012
International Journal of Distributed Sensor Networks
The other is a hierarchical structure [4-6, 10, 13], 2 ...
Each node chooses a set of keys from a key pool. In the bootstrapping phase, each node finds shared keys with its neighbors. ...
Acknowledgment This work was supported by the National Natural Science Foundation of China (Project no. NSFC60879024). ...
doi:10.1155/2012/406254
fatcat:pufqd4ykvrhltp7aqxtsbvo3ra
A Survey On Security In Wireless Sensor Network
2019
Southeast Europe Journal of Soft Computing
In this paper we present a survey of security issues in WSNs, address the state of the art in research on sensor network security, and discuss some future directions for research. ...
There is numerous applications for wireless sensor networks, and security is vital for many of them. ...
The progress in efficiently implementation of ECC and HECC and advances in sensor hardware will make public key cryptosystem practicable in a few years. ...
doi:10.21533/scjournal.v8i1.174
fatcat:5qi4jzi6g5cfldjyuhyf2qku7u
A survey of security issues in wireless sensor networks
2006
IEEE Communications Surveys and Tutorials
These tiny sensor nodes, consisting of sensing, data processing, and communication components, make it possible to deploy Wireless Sensor Networks (WSNs), which represent a significant improvement over ...
Along the way we highlight the advantages and disadvantages of various WSN security protocols and further compare and evaluate these protocols based on each of these five categories. ...
They further discussed the use of combinatorial set systems in the design of deterministic key predistribution schemes for WSNs in [67] . ...
doi:10.1109/comst.2006.315852
fatcat:sfaux6aqxjf4jhuasgozm3a7su
Online Health Care System: A Survey
2022
International Journal for Research in Applied Science and Engineering Technology
However, in this pandemic it is very difficult to obtain the consultation with the doctor for every health problem so to overcome this problem Online Healthcare System can be implemented. ...
and a "Chatbot", Which is a type of software that used to redirect the conversation between human beings and users which will help people to provide details according to their quires in an productive ...
The most promising method among these is the random key predistribution which associates a node's keys with its identity. ...
doi:10.22214/ijraset.2022.40349
fatcat:5b4g757ilrdzjolmexukk5itzi
A survey of key management in ad hoc networks
2006
IEEE Communications Surveys and Tutorials
The general assumption is that nodes in possession of a valid secret key can be trusted. Consequently, a secure and efficient key-management scheme is crucial. ...
Keys are a prerequisite to bootstrap a protected network service. ...
We also thank Leif Nilsen of the Univeristy of Oslo's University Graduate Centre/Thales Group Norway for valuable discussions and comments on our work. A special thanks to Prof. ...
doi:10.1109/comst.2006.253271
fatcat:zaobvvfiqzc2jovl7rozpplhxa
A survey of key management schemes in wireless sensor networks
2007
Computer Communications
In this paper, we provide a survey of key management schemes in wireless sensor networks. ...
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. ...
First we will describe the structure and features of the Basic Scheme and then how it may be evaluated using two of the three Rs of efficient sensor networks, revocation and resilience (through rekeying ...
doi:10.1016/j.comcom.2007.04.009
fatcat:h4dpize62nbkhpbnziusau4l4e
« Previous
Showing results 1 — 15 out of 129 results