Filters








192,903 Hits in 3.4 sec

Key Management in Sensor Networks [chapter]

Guorui Li, Jingsha He, Yingfang Fu
2006 Lecture Notes in Computer Science  
In a mobile network scenario, however, the probabilistic key management as described in [9] can lead to a SAP of one order of magnitude larger than the one in a static network due to node fabrication attacks  ...  Our new architectures, specifically targeted at the sensor-node platform, protect long-term keys using a root of trust embedded in the hardware System-on-a-Chip (SoC).  ...  Key Management in Sensor Networks Key Management in Sensor Networks  ... 
doi:10.1007/11814856_44 fatcat:gnh34klgjvdnnpnch5am6qssd4

Key Management in Wireless Sensor Networks

Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade
2015 Journal of Sensor and Actuator Networks  
In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium.  ...  Wireless sensor networks are a challenging field of research when it comes to security issues.  ...  Author Contributions In this paper, Ismail Mansour, Gerard Chalhoub and Pascal Lafourcade have worked together on the design, verification and evaluation of the protocols, while the implementation work  ... 
doi:10.3390/jsan4030251 fatcat:tszrm6277vbrhlhej3bl5se264

Efficient key management in sensor networks

Abhishek Parakh, Subhash Kak
2010 2010 IEEE Globecom Workshops  
We present an efficient key distribution scheme for sensor networks in which resource constraints and the possibility of node capture and malfunctions are considered.  ...  Under certain assumptions, the scheme has an upper bound of log2N on the diameter of the network and the number of keys required per node (where N is the number of nodes in the network).  ...  Second, sensors could encrypt every message they receive that is not intended for it with all the keys that they have in their key ring and flood the network.  ... 
doi:10.1109/glocomw.2010.5700196 fatcat:55m5ldi4cvgbpervxxyi4xqvyy

Key Management in Mobile Sensor Networks [article]

Anvesh Reddy Aileni
2011 arXiv   pre-print
The security of the entire network is considered through efficient key management by taking into consideration the network's power capabilities.  ...  Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities.  ...  [20] proposed group based key management for mobile sensor networks in which they have both static and mobile sensor nodes and the network is divided into groups.  ... 
arXiv:1104.2565v1 fatcat:u7wwxswnl5bxvjhlexrabk73mu

Group Key Managements in Wireless Sensor Networks [chapter]

Ju-hyung Son, Seung-woo Seo, Seung-woo Seo
2010 Sustainable Wireless Sensor Networks  
A sensor network operating in open environments requires a network-wide group key for confidentiality of exchanged messages between sensor nodes.  ...  In this chapter, we propose an energy-efficient group key management scheme called Topological Key Hierarchy (TKH).  ...  Key Managements in Wireless Sensor Networks www.intechopen.com www.intechopen.com  ... 
doi:10.5772/13186 fatcat:jdbuqrnlnzchlkjgkrlvgy6rsi

New Directions in Sensor Network Key Management

David W. Carman
2005 International Journal of Distributed Sensor Networks  
Sensor networks require efficient, low latency key management techniques that enable strong security and tolerance of node compromise.  ...  IBRKP establishes pair-wise keys with virtually no extra communications and provides security versus node memory trade-offs for the sensor network designer to engineer.  ...  Traditional public-key infrastructure solutions are unsuitable for managing keys in distributed sensor networks.  ... 
doi:10.1080/15501320490522803 fatcat:n7snk75tdzfoxp5fci6w63oley

Key Management Techniques in Wireless Sensor Networks

Khawla Naji Shnaikat, Ayman Ahmed AlQudah
2014 International journal of network security and its applications  
In this paper we will explain different key management schemes, critique them theoretically, and propose an idea as a way out for the expected problems in one of these schemes.  ...  So first of all, the necessary keys need to be distributed to the nodes before they are disseminated in the target area, and then let the sensors that need to communicate establish its secure communication  ...  The key management techniques should not depend on the sensor location specially when starting keying process [2] . • Bandwidth: The key establishment process in WSN is limited to sensor nodes constraints  ... 
doi:10.5121/ijnsa.2014.6605 fatcat:wbntqh3eurbaxocfqpdc7gteoy

Key management in wireless sensor networks with inter-network sensor roaming

S. Choi, V. Sarangan, S. Trost
2008 2008 33rd IEEE Conference on Local Computer Networks (LCN)  
Base stations are, in general, considered to have more processing power and enough resources to manage a WSN.  ...  Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications.  ...  Each WSN should be able to keep its local key management process confidential while at the same time allowing sensor nodes from other networks to seamlessly move into its realm.  ... 
doi:10.1109/lcn.2008.4664187 dblp:conf/lcn/ChoiST08 fatcat:376jnhgurzgifeyjd4feqxhqg4

Cluster-Based Key Management in Wireless Sensor Networks

2009 Journal of the ACS Advances in Computer Science  
Wireless sensor network (WSN) has unique nature which is different from other kinds of networks.  ...  Key management, in general, involves both the key establishment and key distribution. Traditional key management is difficult to apply in WSN due to its nature.  ...  Many key management schemes used in general networks, such as Diffie-Hellman and public-key-based schemes, are not suitable for wireless sensor networks [7] .  ... 
doi:10.21608/asc.2009.158220 fatcat:qefsefxas5e6nig25jriflln3e

Key Management and Cryptography in Wireless Sensor Networks

2020 International journal of recent technology and engineering  
Hence, the dynamic wireless sensor networks should ensure better quality of sensor nodes that covers wider network area and additional services in relative to static WSNs systems.  ...  Key Management is the recent security concept enabled to provide secure communication between sender and receiver nodes.  ...  So after overall observations we can be used Non-Credentials Key Governance Process (NC-KGP) algorithm for key management and cryptography in wireless sensor networks. IV.  ... 
doi:10.35940/ijrte.d4242.018520 fatcat:77vuxzt2a5f3dmtqy5dmhshhxm

Effective Key Management in Dynamic Wireless Sensor Networks

Seung-Hyun Seo, Jongho Won, Salmin Sultana, Elisa Bertino
2015 IEEE Transactions on Information Forensics and Security  
Index Terms-Wireless sensor networks, certificateless public key cryptography, key management scheme.  ...  In this paper, we propose a certificateless-effective key management (CL-EKM) protocol for secure communication in dynamic WSNs characterized by node mobility.  ...  The network consists of a number of stationary or mobile sensor nodes and a BS that manages the network and collects data from the sensors.  ... 
doi:10.1109/tifs.2014.2375555 fatcat:uaw3ygxxazeuvcd7th6uzt2zoq

Cluster based Key Management in Wireless Sensor Networks [article]

Anvesh Aileni
2010 arXiv   pre-print
The security of the entire network through efficient key management by taking into consideration the network's power capabilities is discussed.  ...  In this paper, the whole network of sensor nodes is divided into clusters based on their physical locations.  ...  Thus efficient key management has to be performed in order to store keys in nodes such that the network security is not compromised and also the total number of keys stored in the node is reduced.  ... 
arXiv:1010.4816v1 fatcat:fbcr2mcccbh3hphcq5brftzwty

Scalable cryptographic key management in wireless sensor networks

A. Wadaa, S. Olariu, L. Wilson
2004 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings.  
The scheme scales well in the size of the network and supports dynamic setup and management of arbitrary structures of secure group communications in large-scale wireless sensor network.  ...  We propose a scalable key management scheme for sensor networks consisting of a large-scale random deployment of commodity sensor nodes that are anonymous.  ...  Group Key Management for WSNs: Our Solution We propose a scheme for group key management in large-scale sensor networks of anonymous nodes.  ... 
doi:10.1109/icdcsw.2004.1284124 dblp:conf/icdcsw/WadaaOWE04 fatcat:oym4o7mxrjevxothxsz6cv6ifu

Centralized Key Management Scheme in Wireless Sensor Networks

Saber Banihashemian, Abbas Ghaemi Bafghi, Mohammad Hossien Yaghmaee Moghaddam
2011 Wireless personal communications  
Today, key management is widely recognized as an important aspect of security in wireless sensor networks. In these networks, sensor nodes can be either mobile or static.  ...  In our previous work, we presented a key management scheme that was more efficient with respect to security and connectivity compared to the other ones.  ...  Conclusion In this paper a protocol called CRKPH has been proposed for the key management of the mobile wireless sensor networks.  ... 
doi:10.1007/s11277-011-0302-y fatcat:woam4gyau5gljnbxfxfhryuoz4

A Key Management Techniques in Wireless Sensor Networks

Ahmed S., Salah E., Ayman El-Sayed
2017 Communications on Applied Electronics  
Wireless sensor networks are visualized in military, medicinal services applications and business, where the data at these filed is very important.  ...  Since the nodes in a WSN have computational and control imperatives, the key management protocol for these networks must be to a great degree lightweight.  ...  Lightweight Key Management System [44] , the approach requires the sensors to share a little arrangement of secret keys. These keys are stacked in every sensor before sending.  ... 
doi:10.5120/cae2017652600 fatcat:bx6hmnwwvzaydb5cb5ol5napte
« Previous Showing results 1 — 15 out of 192,903 results