Filters








2,100 Hits in 2.7 sec

Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments

Jaeseung Lee, Yunsick Sung, Jong Park
2016 Sensors  
Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce.  ...  Thus, this study considers energy efficiency to make the best use of limited resources and suggests a lightweight mutual verification and key exchange method based on a hash function that has no restrictions  ...  A clustered group is divided into routing trees and encrypts communication between the nodes with the key at the same level; the key is renewed when a node enters or leaves the network.  ... 
doi:10.3390/s16122044 pmid:27916962 pmcid:PMC5191025 fatcat:wisg55ho75f4jagutbhay2d5va

Secure key renewal and revocation for Wireless Sensor Networks

Ismail Mansour, Gerard Chalhoub, Pascal Lafourcade, Francois Delobel
2014 39th Annual IEEE Conference on Local Computer Networks  
We propose several secure WSN protocols for revocations and renewal of cryptographic keys in the network based on symmetric encryption and elliptic curve cryptography (ECC).  ...  Once a secure mechanism for authenticated communication is deployed in a Wireless Sensor Network (WSN), several situations may arise: a node can leave the network, a new node can join the network, an intruder  ...  This cluster head receives the list of new keys for renewal and sends them to the other cluster gateways which in turn send them to the sensor nodes.  ... 
doi:10.1109/lcn.2014.6925797 dblp:conf/lcn/MansourCLD14 fatcat:heed7qkamncivb7u5wto7jqnhi

On Building a Lightweight Security Architecture for Sensor Networks [chapter]

Taejoon Park, Kang G. Shin
2006 Lecture Notes in Computer Science  
In this paper, we give a comprehensive overview of recent research results for securing such sensor networks, and then describe how to build a security framework, called a Lightweight Security Architecture  ...  (LiSA), for sensor networks, which achieves energy-aware security via closely-coupled, mutually-complementary security solutions.  ...  Second, key management/sharing deals with efficient distribution, sharing and renewal of keys, and consists of two mutually complementary schemes: the cluster-based scheme is tailored to localized, cluster-based  ... 
doi:10.1007/11807964_52 fatcat:4waesyg5gnd2zmqznbbxqcoohy

An Efficient and Secure Text Encryption Scheme for Wireless Sensor Network (WSN) Using Dynamic Key Approach

V. Elamurugu, D. J. Evanjaline
2021 International Journal of Computer Networks And Applications  
dynamic sensor clusters.  ...  This approach the sink node through a wireless network, this method offers a has three submethods for establishing keys, renewing keys, stable  ... 
doi:10.22247/ijcna/2021/210726 fatcat:hldbkfiskjerrnlhp3drdf32mm

Key Management in Wireless Sensor Networks

Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade
2015 Journal of Sensor and Actuator Networks  
In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium.  ...  We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels.  ...  This cluster head receives the list of new keys for renewal and sends them to the other cluster gateways, which, in turn, send them to the sensor nodes.  ... 
doi:10.3390/jsan4030251 fatcat:tszrm6277vbrhlhej3bl5se264

REVIEW ON DYNAMIC KEY SECURITY PROTOCOLS IN WIRELESS SENSOR NETWORK USING PSEUDORANDOM NUMBER GENERATOR

Shrivastava N.P., Bansal D
2020 International Journal of Technical Research & Science  
In the Present work, secure key management for providing security is play a vital role over wireless sensor network.  ...  In this paper a survey of security protocols proposed for wireless sensor is provided, the paper also provides a comparison for the same. Security plays an important part in wireless network.  ...  DOI • Cluster Key-Key which is common for a node and its multiple neighbour sensor nodes. ➢ LEAP can prohibit security attacks on sensor networks.  ... 
doi:10.30780/specialissue-icrdet-2019/003 fatcat:u5r77slj3bhqlnofvswa5imkwq

A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

Amit Kumar Gautam, Rakesh Kumar
2021 SN Applied Sciences  
One of the active areas of research is key management, authentication, and trust management in wireless sensor networks (WSN).  ...  AbstractWireless sensor networks (WSN) are the new speed-accelerating technologies worldwide and are used continuously in a range of critical applications.  ...  [29] have given a key distribution approach called Local Key Hierarchy ( LKH++) for a cluster-based sensor network. In LKH++, keys are maintained and saved in a tree data structure.  ... 
doi:10.1007/s42452-020-04089-9 fatcat:ioaq4ud5sfgvlk3bayjfzpddv4

A Flexible and Efficient Key Distribution Scheme for Renewable Wireless Sensor Networks

An-Ni Shen, Song Guo, Victor Leung
2009 EURASIP Journal on Wireless Communications and Networking  
In this paper, we propose a new key distribution scheme for hierarchical WSNs with renewable network devices.  ...  Many applications of wireless sensor network require secure data communications, especially in a hostile environment.  ...  They are also the first solution for key management in WSNs with renewable cluster heads.  ... 
doi:10.1155/2009/240610 fatcat:fzoru5lnyzbtvps36vqdns7mnu

Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

Ching-Tsung Hsueh, Yu-Wei Li, Chih-Yu Wen, Yen-Chieh Ouyang
2010 Sensors  
This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks.  ...  Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks.  ...  The Cluster Key and Gateway Key are used for key distribution in Phase III. The key pool is used for key renewing in Phase IV.  ... 
doi:10.3390/s100201251 pmid:22205866 pmcid:PMC3244012 fatcat:may4d43tinbodknhcb3v7dawae

A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks

Zahid Mahmood, Huansheng Ning, AtaUllah Ghafoor
2017 Sensors  
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources.  ...  To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios.  ...  Acknowledgments: This work was funded by the National Natural Science Foundation of China (61471035), and Fundamental Research Funds for the Central Universities (06105031, 06500010).  ... 
doi:10.3390/s17040670 pmid:28338632 pmcid:PMC5419783 fatcat:vwcinrbxjvgbbbbl5s2s64b7ru

Dynamic key management in wireless sensor networks: A survey

Xiaobing He, Michael Niedermeier, Hermann de Meer
2013 Journal of Network and Computer Applications  
However, the resource-constrained nature of sensor nodes hinders the use of dynamic key management solutions designed for wired and ad hoc networks.  ...  This paper investigates the special requirements of dynamic key management in sensor network environments, and introduces several basic evaluation metrics.  ...  the compromised keys with non-compromised keys) of the existing group key renewal schemes and proposed a lightweight key renewal scheme to evict the compromised nodes, which is depicted is shown in Figure  ... 
doi:10.1016/j.jnca.2012.12.010 fatcat:cdj363o7cbb2xnkorlncxwkk7y

Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism in Wireless and Mobile Networks

Neeraj Chugh, Adarsh Kumar, Alok Aggarwal
2018 International Journal of Computer Networks & Communications  
Key management is one of the major constraints for resource constraint mobile sensor devices.  ...  Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT).  ...  There is a need to use lightweight mechanism for finding an error in sensor-based ad-hoc networks like Traaget al. proposed a Markov chain based technique for making a distinction between an event or error  ... 
doi:10.5121/ijcnc.2018.10605 fatcat:nfyqbztlpzhejhs7rkpobfv6wm

LARK

Gianluca Dini, Ida M. Savino
2011 ACM Transactions on Embedded Computing Systems  
In this paper we present a Lightweight Authenticated ReKeying (LARK) scheme for clustered WSNs.  ...  ., Italy Group communication has proven to be a powerful paradigm for designing applications and services in Wireless Sensor Networks (WSNs).  ...  More in detail, the i-th key K (i) of the chain is the hash image of the LARK: a Lightweight Authenticated ReKeying scheme for Clustered Wireless Sensor Networks · 117 previous one K (i 1) .  ... 
doi:10.1145/2043662.2043665 fatcat:5vsicjcgbzdi3lesxastcbamse

LiSP

Taejoon Park, Kang G. Shin
2004 ACM Transactions on Embedded Computing Systems  
Small low-cost sensor devices with limited resources are being used widely to build a self-organizing wireless network for various applications, such as situation monitoring and asset surveillance.  ...  Making such a sensor network secure is crucial to their intended applications, yet challenging due to the severe resource constraints in each sensor device.  ...  LIGHTWEIGHT SECURITY PROTOCOL LiSP aims to offer a lightweight security solution for a large-scale network of resource-limited sensor devices.  ... 
doi:10.1145/1015047.1015056 fatcat:qkurei353bdi7e7zwtfnvggmci

Noncommutative Lightweight Signcryption for Wireless Sensor Networks

Lize Gu, Yun Pan, Mianxiong Dong, Kaoru Ota
2013 International Journal of Distributed Sensor Networks  
In this paper, we at first propose a braid-based signcryption scheme and then develop a key establishment protocol for wireless sensor networks.  ...  Key management techniques for secure wireless-sensor-networks-based applications must minimally incorporate confidentiality, authenticity, integrity, scalability, and flexibility.  ...  the National Natural Science Foundation of China (NSFC) (nos. 61003285, 61070251, 61103198), the NSFC A3 Foresight Program (no. 61161140320) and the JSPS A3 Foresight Program, JSPS Research Fellowships for  ... 
doi:10.1155/2013/818917 fatcat:gzlglbgue5eahkk7336gtxljrm
« Previous Showing results 1 — 15 out of 2,100 results