Filters








1,777 Hits in 3.3 sec

Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks

Matthias Carlier, Kris Steenhaut, An Braeken
2019 Computers  
This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol.  ...  Confidentiality, integrity, and authentication are established, using solely symmetric-key-based operations.  ...  Introduction Wireless Sensor Networks (WSNs) often employ low-power devices with low data rates, which communicate over lossy networks.  ... 
doi:10.3390/computers8010027 fatcat:hpihtke3hvazhn3qcurntssbwu

Insights on Effectiveness of Secure Multicast Communication Scheme in Future Wireless Network

Ranjan Kumar H S, NMAM Institute of Technology, Nitte, Karkala, India
2019 International Journal of Advanced Trends in Computer Science and Engineering  
However, futuristic wireless network calls for significant changes in the multicast scheme while there is a significant issue to support potential security.  ...  With the increasing number of the ubiquitous application over the mobile network, the multicast communication system is the better option for boosting communication performance in the conventional wireless  ...  [20] have used a mechanism that can generate a symmetric secret key in order to secure the group based communication system.  ... 
doi:10.30534/ijatcse/2019/51842019 fatcat:njbjzs5ysvd4nd7dmrmolrjz5i

Security and resilience for smart devices and applications

Damien Sauveron, Konstantinos Markantonakis, Christos Verikoukis
2014 EURASIP Journal on Wireless Communications and Networking  
Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices.  ...  There are many open questions for these challenging issues such as security of protocols and applications, secure architecture, frameworks and methodologies for next generation wireless networks and respective  ...  However, special thanks go to Professor Luc Vandendorpe, Editor-in-Chief, for approving and making this issue possible and to the staff of EURASIP Journal on Wireless Communications and Networks for their  ... 
doi:10.1186/1687-1499-2014-123 fatcat:ljmyjdcaezf7ngavdybaz3ftbm

EFFICIENT AND SECURE AUTHENTICATION BY USING 3-PATH TRANSMISSION IN AD HOC NETWORKS

VETRI SELVI S, PURUS HOTHAMAN
2012 International Journal of Smart Sensor and Adhoc Network.  
They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median.  ...  In existing TAM Tired Authentication scheme for Multicast traffic is proposed for ad-hoc networks. It exposed network clustering to reduce the overhead and to improve the scalability.  ...  In multicast communication, a group key is given to every authorized member. This group key is used by the sender as a symmetric key to encipher the multicast traffic.  ... 
doi:10.47893/ijssan.2012.1144 fatcat:n7syrf5dn5bwjimz5r3u4t5lly

On optimizing energy consumption: An adaptative authentication level in wireless sensor networks

Martin Peres, Mohamed Aymen Chalouf, Francine Krief
2011 Global Information Infrastructure Symposium - GIIS 2011  
ACKNOWLEDGEMENTS This work is part of research project called DIstributed Applications and Functions Over Redundant Unattended Sensors (DIAFORUS) [24] , funded by the French National Research Agency (  ...  Security of wireless sensor networks has been a hot research topic for years.  ...  Thus, the gateway between the sensor network and the Internet does not have to be trusted anymore. 2) Security for multicast communications: In the case of a one-to-many communications, security could  ... 
doi:10.1109/giis.2011.6026718 fatcat:mga3ezvlczbgdcesl46dmfjgqm

Group Key Managements in Wireless Sensor Networks [chapter]

Ju-hyung Son, Seung-woo Seo, Seung-woo Seo
2010 Sustainable Wireless Sensor Networks  
TKH generates a key tree by using the underlying sensor network topology with consideration of subtree-based key tree separation and wireless multicast advantage.  ...  A sensor network operating in open environments requires a network-wide group key for confidentiality of exchanged messages between sensor nodes.  ...  Based on the above motivations for the development of the group security mechanisms for wireless sensor networks, we investigate efficient & secure group key management schemes in this chapter.  ... 
doi:10.5772/13186 fatcat:jdbuqrnlnzchlkjgkrlvgy6rsi

Establishment of Secure Communication in Wireless Sensor Networks

T P Rani
2012 Computer Science & Engineering An International Journal  
Finally, we aim to provide the different techniques of efficient key management operations for secure communications in WSN.  ...  Wireless sensor networks (WSN) have attracted significant interests from the research community in a wide range of applications such as target tracking, environment monitoring, military sensing, distributed  ...  IV.CONCLUSION Thus, we provide features of various key management schemes for establishing secure communication in a wireless sensor network .Security can be accomplished by adapting the type of Key Management  ... 
doi:10.5121/cseij.2012.2204 fatcat:r3r7khre4zdfhluvr2gerfaddm

Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks

Keyur Parmar, Devesh C. Jinwala
2015 Journal of Information Security  
In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation.  ...  As sensor network has a non-replenishable energy supply, the use of symmetric key based homomorphic primitives improves the energy efficiency and increase the sensor network's lifetime.  ...  Acknowledgements This research was a part of the project "A Secure Data Aggregation System and An Intrusion Detection System for Wireless Sensor Networks".  ... 
doi:10.4236/jis.2015.61005 fatcat:jxdaqm56ynb65kxtcsrrpaini4

SECURE AND AUTHENTICATED KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORK

U. Mekala
2017 International Journal of Advanced Research in Computer Science  
Encryption and key distribution are significant primitives to build secure Wireless Sensor Networks (WSN).  ...  Information security in frame less wireless sensor networks (WSNs) is one of the most significant research challenges.  ...  THE PROPOSED PROTOCOL FOR AUTHENTICATED WIRELESS SENSOR NETWORKS AND KEY MANAGEMENT This protocol is based on a amalgamation of three different techniques.  ... 
doi:10.26483/ijarcs.v8i8.4607 fatcat:ccaki2wchvbn7itjbbhd4etmyu

Challenges For Security In Wireless Sensor Networks (Wsns)

Muazzam A. Khan, Ghalib A. Shah, Muhammad Sher
2011 Zenodo  
Wireless sensor network is formed with the combination of sensor nodes and sink nodes. Recently Wireless sensor network has attracted attention of the research community.  ...  Still, more work needs to be done.In this paper we provide a detailed discussion on security in wireless sensor networks.  ...  Karlof et al for secure communication in resource limited wireless sensor networks.  ... 
doi:10.5281/zenodo.1334422 fatcat:gpfyqq545beerkx4qorv7v4w54

A Survey on Security Frameworks for Cluster Based Wireless Sensor Networks

2015 International Journal of Science and Research (IJSR)  
A wireless sensor network (WSN) is a network system for geographically distributed resources using wireless sensor nodes to observe physical or environmental conditions such as temperature, motion, and  ...  Sensor node and base stations in some situations like battlefield need to be mobile.  ...  this protocols in our design to fulfill goals of security in cluster based wireless sensor networks.  ... 
doi:10.21275/v4i12.nov152266 fatcat:k7ztlqjpjvbdpijqjcsq3ufc34

Providing perfect forward secrecy for location-aware wireless sensor networks

Chi-Tung Chen, Shu-Yan Huang, Iuon-Chang Lin
2012 EURASIP Journal on Wireless Communications and Networking  
How to distribute keys into every sensor node is an important issue in many applications for hierarchical sensor networks.  ...  Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks.  ...  Sensor nodes can sense and forward the readings to the base station (or sink), so the secure communication among sensor nodes is one of many important security issues in the sensor networks for the purpose  ... 
doi:10.1186/1687-1499-2012-241 fatcat:becnqvvel5cpvjnjamkblyx2sy

Review on Design and Implementation of Hop to Hop Message Authentication and Source Privacy in Wireless Sensor Networks
IJARCCE - Computer and Communication Engineering

Dipika R. Bisne, Mr. Punesh U. Tembhare
2015 IJARCCE  
wireless sensor networks.  ...  An attacker can easily access the key by occupying a single sensor node. So, It will does not work in multicast networks.  ...  Secure Network Discovery by Message Authentication in Wireless Sensor Network paper introduced efficient schemes; Symmetric Key and Hash Based Authentication, A Secret Polynomial Based Message Authentication  ... 
doi:10.17148/ijarcce.2015.4136 fatcat:7zrtwprfmjgdblzmqyqe6fsjua

Cyber security in the Smart Grid: Survey and challenges

Wenye Wang, Zhuo Lu
2013 Computer Networks  
Specifically, we focus on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid.  ...  Potential cyber security threats: Since cyber attacks mainly come from malicious threats in communication networks, we review cyber attacks in electric power systems, and provide an extensive analysis  ...  Xiang Lu for setting up power substation networks and providing experimental results used in Section 6.  ... 
doi:10.1016/j.comnet.2012.12.017 fatcat:ow4rerhh4bcijjmto2zbqcbcky

Polynomial Based Scheme for Secure SCADA Operations

Pramod T.C., N.R. Sunitha
2015 Procedia Technology - Elsevier  
In this new approach, secret key is not transmitted in the network for any device to device communications.  ...  In this paper, by considering the efficiency requirements in such networks, we propose a key establishment scheme for SCADA systems based on polynomial key distribution scheme.  ...  In this group based scheme, join/leave operation disturbs the entire network. In [8] , Key Management for Secure Power SCADA is proposed.  ... 
doi:10.1016/j.protcy.2015.10.027 fatcat:l7o2anwvtjgkvevpyy3l54ajai
« Previous Showing results 1 — 15 out of 1,777 results