Filters








129 Hits in 4.3 sec

Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks [article]

Hao Chen
2010 arXiv   pre-print
These key predistribution schemes from different random curves can be used for various parts of hierarchical networks.  ...  However different and random these KPSs can be used for various parts of the networks for enhancing the resilience. We also presentkey predistribution schemes from a family hyperelliptic curves.  ...  Acknowledgment: The work was supported by the National Natural Science Foundation of China Grant 10871068.  ... 
arXiv:1007.3046v1 fatcat:i2ify3hgorhr5ba2s3tfrjr4pm

Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)

Ashwag Albakri, Lein Harn, Sejun Song
2019 Security and Communication Networks  
In this paper, we propose a novel polynomial-based scheme with a probabilistic security feature that effectively reduces the security risk of sensor-captured attacks and requires minimal memory and computation  ...  Designing a key distribution/establishment scheme in WSNs is a challenging task due to the limited resources of sensor nodes.  ...  (vi) It has a hierarchical key management structure, which means it minimizes the storage requirements of each sensor, CH, and the sink.  ... 
doi:10.1155/2019/3950129 fatcat:lzrwj55m5fakvbrbzmhiex2x2a

Sensor network security: a survey

Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou
2009 IEEE Communications Surveys and Tutorials  
Then we give a holistic overview of security issues.  ...  These issues are divided into seven categories: cryptography, key management, attack detections and preventions, secure routing, secure location security, secure data fusion, and other security issues.  ...  Based on the usage of hierarchical structure of sensor networks and symmetric key, they propose a secure routing protocol.  ... 
doi:10.1109/surv.2009.090205 fatcat:qcm4ieoqwrdl7ezxffdsdfyk3e

SecLEACH—On the security of clustered sensor networks

Leonardo B. Oliveira, Adrian Ferreira, Marco A. Vilaça, Hao Chi Wong, Marshall Bern, Ricardo Dahab, Antonio A.F. Loureiro
2007 Signal Processing  
We present our solution, and provide a detailed analysis of how different values for the various parameters in such a system impact a hierarchical network in terms of security and energy efficiency.  ...  For this purpose, we show how random key predistribution, widely studied in the context of flat networks, and mTESLA, a building block from SPINS, can be both used to secure communications in this type  ...  a system.  ... 
doi:10.1016/j.sigpro.2007.05.016 fatcat:ayiybpwi4rg6dbjp5glkihzpem

Scalable and efficient key management for heterogeneous sensor networks

Firdous Kausar, Sajid Hussain, Laurence T. Yang, Ashraf Masood
2008 Journal of Supercomputing  
We consider hierarchical HSN consisting of a small number high-end sensors and a large number of low-end sensors.  ...  As typical wireless sensor networks (WSNs) have resource limitations, predistribution of secret keys is possibly the most practical approach for secure network communications.  ...  Clustering of sensors HSN consists of a hierarchical structure where sensors are divided into clusters and each cluster is managed by a cluster head, as shown in Fig. 1 .  ... 
doi:10.1007/s11227-008-0184-2 fatcat:sdfvhxasg5aqtng7gtitinscbi

PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks

Yanan Liu, Yijun Cui, Lein Harn, Zheng Zhang, Hao Yan, Yuan Cheng, Shuo Qiu, Qing Yang
2021 Security and Communication Networks  
Because of the movements of sensor nodes and unknown mobility pattern, how to ensure two communicating (static or mobile) nodes authenticate and share a pairwise key is important.  ...  Compared with traditional key predistribution schemes, the proposal reduces the storage overhead and the key exposure risks and thereby improves the resilience against node capture attacks.  ...  However, in our work, we consider each PUF structure as a black-box challenge-response system, where a set of challenges are available and the system responds with a set of sufficiently different responses  ... 
doi:10.1155/2021/5532683 fatcat:mvyp43vh3fbxhagl5zbfr2cceq

On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks [article]

Keith M. Martin
2009 arXiv   pre-print
We review and examine the appropriateness of combinatorial designs as a tool for building key predistribution schemes suitable for such environments.  ...  The rich mathematical structure of combinatorial designs has resulted in the proposal of several key predistribution schemes for wireless sensor networks based on designs.  ...  There has been some debate about the practicality of using public key cryptography to implement security services in a WSN [18] .  ... 
arXiv:0902.0458v1 fatcat:vpufcfwa5faelic22wq2vnjbsu

Dynamic Resiliency Analysis of Key Predistribution in Wireless Sensor Networks

A. O. Durahim, A. Levi
2009 2009 IEEE International Conference on Communications  
Wireless sensor networks have been analyzed for more than a decade from operational and security points of view. Several key predistribution schemes have been proposed in the literature.  ...  In this paper, we propose such a dynamic approach to measure the resiliency of key predistribution schemes in sensor networks.  ...  Random Key Predistribution and Key Establishment We use Eschenauer and Gligor's [1] EG random key predistribution scheme in our simulations.  ... 
doi:10.1109/icc.2009.5198959 dblp:conf/icc/DurahimL09 fatcat:ytgbxvkon5bljf2mpfrwfg5jda

A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks

G. Hanaoka
2002 Computer journal  
The Key Predistribution Systems (KPSs) are a large class of such key sharing schemes.  ...  Although KPSs provide common keys for all possible communication links among entities, in practical communication systems most of them will not be necessary.  ...  The first author is supported by a Research Fellowship of the JSPS. Part of this research was presented at ASIACRYPT'99 [20] .  ... 
doi:10.1093/comjnl/45.3.293 fatcat:cwbk454sczfzdecj6u6sq46ari

An Efficient Key Management Scheme for Wireless Sensor Networks

Dahai Du, Huagang Xiong, Hailiang Wang
2012 International Journal of Distributed Sensor Networks  
The other is a hierarchical structure [4-6, 10, 13], 2  ...  Each node chooses a set of keys from a key pool. In the bootstrapping phase, each node finds shared keys with its neighbors.  ...  Acknowledgment This work was supported by the National Natural Science Foundation of China (Project no. NSFC60879024).  ... 
doi:10.1155/2012/406254 fatcat:pufqd4ykvrhltp7aqxtsbvo3ra

A Survey On Security In Wireless Sensor Network

Faris Fazlic, Seyed Ali Hashemi, Ahmed Aletic, Ali Abd Almisreb, Syamimi Mohd Norzeli, Norashidah Md Din
2019 Southeast Europe Journal of Soft Computing  
In this paper we present a survey of security issues in WSNs, address the state of the art in research on sensor network security, and discuss some future directions for research.  ...  There is numerous applications for wireless sensor networks, and security is vital for many of them.  ...  The progress in efficiently implementation of ECC and HECC and advances in sensor hardware will make public key cryptosystem practicable in a few years.  ... 
doi:10.21533/scjournal.v8i1.174 fatcat:5qi4jzi6g5cfldjyuhyf2qku7u

A survey of security issues in wireless sensor networks

Yong Wang, Garhan Attebury, Byrav Ramamurthy
2006 IEEE Communications Surveys and Tutorials  
These tiny sensor nodes, consisting of sensing, data processing, and communication components, make it possible to deploy Wireless Sensor Networks (WSNs), which represent a significant improvement over  ...  Along the way we highlight the advantages and disadvantages of various WSN security protocols and further compare and evaluate these protocols based on each of these five categories.  ...  They further discussed the use of combinatorial set systems in the design of deterministic key predistribution schemes for WSNs in [67] .  ... 
doi:10.1109/comst.2006.315852 fatcat:sfaux6aqxjf4jhuasgozm3a7su

Online Health Care System: A Survey

Nijhum Mohapatra, Dr. Bhuvana J
2022 International Journal for Research in Applied Science and Engineering Technology  
However, in this pandemic it is very difficult to obtain the consultation with the doctor for every health problem so to overcome this problem Online Healthcare System can be implemented.  ...  and a "Chatbot", Which is a type of software that used to redirect the conversation between human beings and users which will help people to provide details according to their quires in an productive  ...  The most promising method among these is the random key predistribution which associates a node's keys with its identity.  ... 
doi:10.22214/ijraset.2022.40349 fatcat:5b4g757ilrdzjolmexukk5itzi

A survey of key management in ad hoc networks

Anne Marie Hegland, Eli Winjum, Stig F. Mjolsnes, Chunming Rong, Oivind Kure, Pal Spilling
2006 IEEE Communications Surveys and Tutorials  
The general assumption is that nodes in possession of a valid secret key can be trusted. Consequently, a secure and efficient key-management scheme is crucial.  ...  Keys are a prerequisite to bootstrap a protected network service.  ...  We also thank Leif Nilsen of the Univeristy of Oslo's University Graduate Centre/Thales Group Norway for valuable discussions and comments on our work. A special thanks to Prof.  ... 
doi:10.1109/comst.2006.253271 fatcat:zaobvvfiqzc2jovl7rozpplhxa

A survey of key management schemes in wireless sensor networks

Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, Michael Galloway
2007 Computer Communications  
In this paper, we provide a survey of key management schemes in wireless sensor networks.  ...  Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas.  ...  First we will describe the structure and features of the Basic Scheme and then how it may be evaluated using two of the three Rs of efficient sensor networks, revocation and resilience (through rekeying  ... 
doi:10.1016/j.comcom.2007.04.009 fatcat:h4dpize62nbkhpbnziusau4l4e
« Previous Showing results 1 — 15 out of 129 results