1,494 Hits in 7.3 sec

Revisiting random key pre-distribution schemes for wireless sensor networks

Joengmin Hwang, Yongdae Kim
2004 Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN '04  
To solve this problem, several key pre-distribution schemes have been proposed for sensor networks based on random graph theory.  ...  We first review the three key pre-distribution schemes for sensor networks [10, 8, 6 ] that we are focusing on throughout this paper.  ...  (called basic scheme or EG for simplicity) first introduced a key pre-distribution scheme to the area of wireless sensor networks [10] .  ... 
doi:10.1145/1029102.1029111 dblp:conf/sasn/HwangK04 fatcat:7ux5jkif2nfcboejtstsydf7qa

Wireless and Sensor Networks Security (WSNS) A Retrospection

Falko Dressler, Yong Guan, Zhen Jiang
2007 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems  
After three years of organizing the wireless and sensor network security (WSNS) workshop, it is time for some retrospection to the workshop objectives and the visible outcome.  ...  On the one hand, it represents a good source to recapitulate recent research topics related to security in wireless ad hoc and sensor networks.  ...  Jie Wu for helping us initiating this workshop, the active members of the TPC, the countless reviewers, and, above all, the authors who continuously contributed to WSNS.  ... 
doi:10.1109/mobhoc.2007.4428768 dblp:conf/mass/DresslerGJ07 fatcat:nkeqlj7vifbjbj7n5lw2gi53em

Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks

Yong YU, Jianbing NI, Ying SUN
2013 IEICE transactions on information and systems  
Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code.  ...  They also gave a novel distributed reprogramming protocol called SDRP by using identity-based signature, and provided a comprehensive security analysis for their protocol.  ...  Accordingly, distributed reprogramming is more suitable than the traditional approaches for wireless sensor networks.  ... 
doi:10.1587/transinf.e96.d.1875 fatcat:6lwmm6johvhznnzf5gwlyyzjs4

Smart Dust Security – Key Infection Revisited

Daniel Cvrcek, Petr Svenda
2006 Electronical Notes in Theoretical Computer Science  
Sensor network is a notion denoting an interesting subset of self-organising wireless networks.  ...  Applications of such networks assume distributed environmental sensing performed by each sensor in the network, where data from a particular sensor gain value only when combined with data from a relatively  ...  Idea of random key pre-distribution for WSN was for the first time introduced in [8] as EG scheme.  ... 
doi:10.1016/j.entcs.2005.09.043 fatcat:4ikblbi5rjbgjmyr3dgrnaxcnm

Implementation of Rekeying Mechanism for Node Authentication in Wireless Sensor Networks

Anand D. Dhawale
2012 International Journal of Advanced Smart Sensor Network Systems  
Wireless sensor networks (WSNs) are composed of sensor nodes usually called as motes organized in a cooperative network.  ...  Such authentication techniques in wireless sensor networks are analyzed in this paper.  ...  Key Pre-distribution Schemes in Distributed Wireless Sensor Network using Combinatorial De-signs ware revisited by Pattanayak and Majhi [11] .  ... 
doi:10.5121/ijassn.2012.2405 fatcat:rddljx56lnb6dk6lnaaamiaws4

Authenticated key exchange with group support for wireless sensor networks

Petr Svenda, Vaclav Matyas
2007 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems  
Our work targets the area of authenticated key exchange for wireless sensor networks.  ...  We present a new idea of group support for authenticated key exchange that substantially increases the resilience of an underlaying probabilistic key pre-distribution scheme against the threat of node  ...  We propose a novel idea for key exchange and entity authentication based on the random pre-distribution scheme.  ... 
doi:10.1109/mobhoc.2007.4428767 dblp:conf/mass/SvendaM07 fatcat:zsdnwk4vavgbznbzmdgtn5ylwq

Improving key predistribution with deployment knowledge in static sensor networks

Donggang Liu, Peng Ning
2005 ACM transactions on sensor networks  
Pairwise key establishment is a fundamental security service for sensor networks.  ...  This paper proposes to use both pre-deployment and post-deployment knowledge to improve pairwise key pre-distribution in static sensor networks.  ...  Acknowledgment The authors would like to thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1145/1105688.1105691 fatcat:ctwz5w3qcraexfu52xxutxzfam

The future of security in Wireless Multimedia Sensor Networks

Manel Guerrero-Zapata, Ruken Zilan, José M. Barceló-Ordinas, Kemal Bicakci, Bulent Tavli
2009 Telecommunications Systems  
This is a position paper on our views on security aspects of Wireless Multimedia Sensor Networks (Secure WMSNs). It is meant to serve as a brief survey.  ...  Key distribution mechanisms for wireless sensor networks: a survey (Tech. rep.). 22. Gaubatz, G., Kaps, J. P., & Sunar, B. (2004). Public key cryptography in sensor networks-revisited. In C.  ...  An efficient random key pre-distribution scheme for manet security. IEEE Journal on Selected Areas of Communication.20. Liu, D., Ning, P., & Li, R. (2005).  ... 
doi:10.1007/s11235-009-9235-0 fatcat:rcwslfkznvhcdcxe5ngn4upvfy

Empirical Usage of Body Area Network and Group key in Home Health Care System

K. Suseendhra, S. Prakasam
2014 International Journal of Computer Applications  
Body Area Networks are the networks of wireless medical sensors, deployed on a person for enabling pervasive, individualized real time health management.  ...  The Body Area Network along with the group key is established for the security concern where they will provide a separate key to each of the sensors that are of deployed in the patient body when this key  ...  Group key By using the symmetric keys between the sensor nodes are of employed in the wireless sensor networks by using three categories such as pair wise scheme, pre distribution scheme , random key  ... 
doi:10.5120/14906-3427 fatcat:hu2gdkgxuzg43etnzxlw7i6dle

Efficient and robust query processing for mobile wireless sensor networks

Huilong Huang, John H. Hartman, Terril N. Hurst
2007 International Journal of Sensor Networks (IJSNet)  
We present CNFS, an algorithm for efficient and robust query processing for mobile wireless sensor networks. CNFS is a walk-based algorithm that is biased to visit nodes close to the source first.  ...  than random walk-based algorithms in both sparse and dense networks.  ...  The networks consist of 100 nodes randomly distributed across a given area. For each area we generated 20 different random networks, and for each network we generated 1000 different random queries.  ... 
doi:10.1504/ijsnet.2007.012988 fatcat:m55team4vzfzlioihxeyduzehi

Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks

Michael Sirivianos, Dirk Westhoff, Frederik Armknecht, Joao Girao
2007 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops  
Aggregator nodes commonly have the ability to read, corrupt or disrupt the flow of information produced by a Wireless Sensor Network (WSN).  ...  We conclude that these requirements can be satisfied by a distributed random number generator function in which no node is able to determine the output of the function.  ...  These keys are used by the sensor nodes to conceal their random values before they are distributed in the sector S.  ... 
doi:10.1109/wiopt.2007.4480031 dblp:conf/wiopt/SirivianosWAG07 fatcat:ymzgtrudkrgmbptlyxxhsfb6ny

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ...  Closest (location-based) pair-wise keys pre-distribution scheme [11] is an alternative to Random pair-wise key scheme [10] .  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

Francis Minhthang Bui, Dimitrios Hatzinakos
2007 EURASIP Journal on Advances in Signal Processing  
keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption  ...  In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic  ...  For instance, a key distribution scheme based on fuzzy commitment is appropriate [1, 10] .  ... 
doi:10.1155/2008/529879 fatcat:vtjlmzyipvfinc6h7sepmihila

Secure Index on Distributed Data: UML Extension for Wireless Sensor Networks

2019 International journal of recent technology and engineering  
However, applications designed for wireless sensor network are attributed with programming which occurs at lower levels of abstractions of the operating system.  ...  The research on wireless sensor network has evolved with applications being developed in several domains.  ...  Secure Index on Distributed Data: UML Extension for Wireless Sensor Networks VandanaBhasin II.  ... 
doi:10.35940/ijrte.b1181.0782s619 fatcat:efq763uytrabnkitwvp4j2yj3q

AGREE: exploiting energy harvesting to support data-centric access control in WSNs

Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza
2013 Ad hoc networks  
We thus show how to mitigate the relatively large energy consumption of the CP-ABE cryptographic operations by proposing AGREE (Access control for GREEn wireless sensor networks), a framework which exploits  ...  By integrating access control policies into the (encrypted) data, such mechanisms do not require any server-based access control infrastructure and are thus highly desirable in many wireless sensor network  ...  This research was also sponsored in part by the FP7 project GEN-ESI (GrEen sensor NEtworks for Structural monItoring), by the ARTEMIS project #1000128 CHIRON (Cyclic and person-centric Health management  ... 
doi:10.1016/j.adhoc.2013.03.013 fatcat:egsynhqt6ndwxowscynhixzlha
« Previous Showing results 1 — 15 out of 1,494 results