20 Hits in 0.37 sec

Secure pebblenets

Stefano Basagni, Kris Herrin, Danilo Bruschi, Emilia Rosti
2001 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '01  
d E u B I 1.1 Pebblenets ¡ ¦ £ ¦ 7 1 © ¡ Q ¥ ) ( 0 ! ¡ ¦ d S " 0 ¥ ! ¡ ¦ § B ! 7 $ % $ d u f v ¡ u z $ % & 5 d ! ¡ 8 z © % e ¦ ¡ C 7 § b f $ w 7 t !  ...  ¡ 4 r D ¤ ¥ 6 " b 7 ) © ¡ ¦ © ¦ I First Phase Secure Clusterhead Selection E y § £ ¦ ¡ ! ¡ a " 0 ¡ ¦ # # $ % ¡ ¦ © 5 b 7 8 v ¡ © ¡ ! $ % ¡ 8 W H R ! ¡ u © Y 7 ) T ¡ V 2 ¡ ¦ £ 1 !  ... 
doi:10.1145/501436.501438 fatcat:7duulhljyre6zfxxaob4h5x4e4

Secure pebblenets

Stefano Basagni, Kris Herrin, Danilo Bruschi, Emilia Rosti
2001 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '01  
d E u B I 1.1 Pebblenets ¡ ¦ £ ¦ 7 1 © ¡ Q ¥ ) ( 0 ! ¡ ¦ d S " 0 ¥ ! ¡ ¦ § B ! 7 $ % $ d u f v ¡ u z $ % & 5 d ! ¡ 8 z © % e ¦ ¡ C 7 § b f $ w 7 t !  ...  ¡ 4 r D ¤ ¥ 6 " b 7 ) © ¡ ¦ © ¦ I First Phase Secure Clusterhead Selection E y § £ ¦ ¡ ! ¡ a " 0 ¡ ¦ # # $ % ¡ ¦ © 5 b 7 8 v ¡ © ¡ ! $ % ¡ 8 W H R ! ¡ u © Y 7 ) T ¡ V 2 ¡ ¦ £ 1 !  ... 
doi:10.1145/501416.501438 dblp:conf/mobihoc/BasagniHBR01 fatcat:6jyb2tzqarecjjyjsndl7ivwku

Scalable security in Wireless Sensor and Actuator Networks (WSANs): Integration re-keying with routing

Fei Hu, Waqaas Siddiqui, Krishna Sankar
2007 Computer Networks  
Extensive simulations and hardware experiments have been conducted to verify the energy-efficiency and security performance of our security scheme for WSANs.  ...  Our research aims to address the challenging security issues in Wireless Sensor and Actuator Networks (WSANs), a special type of Wireless Sensor Networks (WSNs).  ...  Fig. 2 . 2 (Top) separate security analysis from routing (bottom) integrate security and routing. Fig. 3 . 3 Pebblenets [31] . Fig. 4 . 4 Proposed ripple-zone-based WSAN routing.  ... 
doi:10.1016/j.comnet.2006.04.024 fatcat:p44qqyhwxjfilfc7warkx32gdm

Security considerations in ad hoc sensor networks

Fei Hu, Neeraj K. Sharma
2005 Ad hoc networks  
This paper analyzes security challenges in wireless sensor networks and summarizes key issues that need be solved for achieving security in an ad hoc network.  ...  As sensor networks come to be wide-spread deployment, security issues become a central concern.  ...  : Secure Pebblenets proposed by Basagni et al  ... 
doi:10.1016/j.adhoc.2003.09.009 fatcat:kiutsu2bvbgcfehtniqdwjbmdm

Overview the Key Management in Ad Hoc Networks [chapter]

Gerardo del Valle, Roberto Gómez Cárdenas
2005 Lecture Notes in Computer Science  
The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed.  ...  [6] Secure Pebblenets This solution proposed by Basagni [7] provides a distributed key management system based on symmetric encryption.  ...  The Secure Pebblenets solution is appropriate for grouporiented ad hoc networks where the network nodes are distributed and do not have the resources or the need for public key based solutions.  ... 
doi:10.1007/11533962_36 fatcat:bdnz2seikzeutaqllnxyxacvmu

Assessing Security in Energy-Efficient Sensor Networks [chapter]

Yee Wei Law, Sandro Etalle, Pieter H. Hartel
2003 Security and Privacy in the Age of Uncertainty  
's pebblenets [1] and Perrig et al.'s SPINS [6] which specifically avoid publickey cryptography that sensors are ill-equipped to handle.  ...  To protect these nuglets from tampering, every node must be equipped with a tamper-resistant security module.  ... 
doi:10.1007/978-0-387-35691-4_46 fatcat:oayoo6pwevgnpn4by3dskrkjnu

A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks

Soo Young Moon, Tae Ho Cho
2014 The Scientific World Journal  
Authentication is an important security mechanism for detecting forged messages in a sensor network.  ...  Therefore, it is hard to control the number of CHs in PebbleNet.  ...  We can exploit any clustering methods such as PebbleNet [23] and LEACH [24] .  ... 
doi:10.1155/2014/185156 pmid:25136649 pmcid:PMC4127250 fatcat:q37eysqzavdrld5dttjzr2rudi

A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

Maan Younis Abdullah, Gui Wei Hua, Naif Alsharabi
2008 Sensors  
This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security.  ...  Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.  ...  s pebblenets [5] are tailored to sensor nodes that have severe computational and storage limitations but are tamper-resistant. Perrig et al.'  ... 
doi:10.3390/s8127866 pmid:27873963 pmcid:PMC3790994 fatcat:lqw3xxrjk5dozbn43v3at6r3uu

Architecture Aware Key Management Scheme for Wireless Sensor Networks

Benamar KADRI, Mohammed FEHAM, Abdellah MHAMMED
2012 International Journal of Information Technology and Computer Science  
In this paper we are going to present a key management scheme in wh ich the base station play the role of the secure third party responsible of distributing key and managing security in the network, t  ...  Usually sensors are limited in capacities deployed in a hostile and unpredictable environ ment, making the security of these networks a challenging task.  ...  Secure Pebblenets provides group authentication, confidentiality and message integrity, by using symmetric encryption.  ... 
doi:10.5815/ijitcs.2012.12.05 fatcat:od5sxcxhljauxelr45nxnxz6bm

How to Secure a Wireless Sensor Network

Yee Wei Law, P.J.M. Havinga
2005 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing  
The security of wireless sensor networks (WSNs) is a complex issue.  ...  While security research of WSNs is progressing at a tremendous pace, and many security techniques have been proposed, no comprehensive framework has so far emerged that attempts to tie the bits and pieces  ...  At the outset, per Principle 2 and 3, schemes like the pebblenets [54] , the terminodes [55, 56] and Luo et al.'s [57] are ruled out.  ... 
doi:10.1109/issnip.2005.1595561 fatcat:n55w5ertzzfnrndppoihzo6pxi

An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks

Benamar Kadri, Djilalli Moussaoui, Mohammed Feham, Abdellah Mhammed
2012 Wireless Sensor Network  
Regarding the nature of sensors and the nature of the environment of deployment sensor networks are exposed to many attacks more than any other networks, therefore new strategies and protocols of security  ...  In this paper we propose a lightweight implementation of public key infrastructure called cluster based public infrastructure (CBPKI), CBPKI is based on the security and the authenticity of the base station  ...  Secure pebblenets: this solution proposed by Basagni [10] is an extended version of the shared key solution.  ... 
doi:10.4236/wsn.2012.46022 fatcat:rorwm3yv4vdnlgcjhpnb6mn3ci

Forward Secure Communication in Wireless Sensor Networks [chapter]

Sjouke Mauw, Ivo van Vessem, Bert Bos
2006 Lecture Notes in Computer Science  
We propose a set of security provisions for node to base station communication in wireless sensor networks.  ...  It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data.  ...  Secure pebblenets [1] relies on a tamper resistance assumption to protect a shared secret key. SEKEN [7] requires the establishment and maintenance of the network topology by the base station.  ... 
doi:10.1007/11734666_4 fatcat:nvpl7vaccbd4rcanjlu2nyf7y4

A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks [chapter]

Yee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel
2003 Lecture Notes in Computer Science  
Balance between security and energy consumption is achieved by partitioning a system into two interoperable security realms: the supervised realm trades off simplicity and resources for higher security  ...  The security and functional requirements of most WSNs are such that under the above constraints, the following guidelines need to be taken into account: 1.  ...  We mentioned Basagni et al's pebblenets and Perrig et al's SPINS in Section 1.  ... 
doi:10.1007/978-3-540-39867-7_3 fatcat:dp7ajajaqrauloufxtxnnr6lou

Council-based Distributed Key Management Scheme for MANETs

Abdelmajid HAJAMI, Mohammed ELKOUTBI
2010 International Journal of Advanced Computer Science and Applications  
In comparison with fixed networks, some new security issues have arisen with the introduction of MANETs. Secure routing, in particular, is an important and complicated issue.  ...  To ensure security using public key cryptography scheme, each node carries a public-private key pair and a certificate issued by the CA.  ...  [9] 4) Secure Pebblenets This solution proposed by Basagni [10] provides a distributed key management system based on symmetric encryption.  ... 
doi:10.14569/ijacsa.2010.010305 fatcat:moomp2wcfzfntlc3wwhp4fozhm

A survey of key management in ad hoc networks

Anne Marie Hegland, Eli Winjum, Stig F. Mjolsnes, Chunming Rong, Oivind Kure, Pal Spilling
2006 IEEE Communications Surveys and Tutorials  
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts.  ...  This article surveys the state of the art within key management for ad hoc networks, and analyzes their applicability for network-layer security.  ...  Secure Pebblenets (PEBL) [75] -Pebblenets refer to large ad hoc networks where the nodes are called pebbles due to their small size and large number (e.g., WSNs).  ... 
doi:10.1109/comst.2006.253271 fatcat:zaobvvfiqzc2jovl7rozpplhxa
« Previous Showing results 1 — 15 out of 20 results