Filters








5,771 Hits in 5.4 sec

The energy cost of cryptographic key establishment in wireless sensor networks

Johann Großschädl, Alexander Szekely, Stefan Tillich
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth.  ...  In this paper we analyze and compare the energy cost of two different protocols for authenticated key establishment.  ...  ACKNOWLEDGEMENTS The authors are grateful to Erkay Savaş and Ingrid Verbauwhede for valuable comments on a draft version of this paper.  ... 
doi:10.1145/1229285.1229334 dblp:conf/ccs/GrossschadlST07 fatcat:z36lp7i6crdrlocgovkadk5u7m

Secure and Energy-Efficient Data Collection in Wireless Sensor Networks

Anfeng Liu, Laurence T. Yang, Motoki Sakai, Mianxiong Dong
2013 International Journal of Distributed Sensor Networks  
Gu et al. has proposed a braid-based signcryption scheme and developed a key establishment protocol for wireless sensor networks.  ...  Wireless sensor networks (WSNs) are a kind of multihop and self-organizing networks formed by the way of wireless communication and composed by a large number of lowcost microsensor nodes deployed in the  ...  have been published in this special issue or not on account of the space limitations.  ... 
doi:10.1155/2013/565076 fatcat:bzpnohxzkbhunbkiuseo3m4yqu

Collaborative Key Exchange System Based on Chinese Remainder Theorem in Heterogeneous Wireless Sensor Networks

Mohamed Kasraoui, Adnane Cabani, Houcine Chafouk
2015 International Journal of Distributed Sensor Networks  
IPv6 over Low Power Wireless Personal Area Networks (6LoWPANs), in the next generation of wireless sensor networks, represent an emerging field which can be integrated with Internet technology.  ...  In this work, we first axed our research to propose a new end-to-end security scheme for IP enabled sensor networks to optimize battery energy consumption and then we adapted the Internet Key Exchange  ...  Acknowledgments This work has been supported by the "Haute-Normandie" Regional Council and the European institutions by the FEDER program.  ... 
doi:10.1155/2015/159518 fatcat:yucvcjbwzngz5l656r7ufrj5we

Energy efficiency of encryption schemes applied to wireless sensor networks

Xueying Zhang, Howard M. Heys, Cheng Li
2011 Security and Communication Networks  
In this paper, we focus on the energy efficiency of secure communication in wireless sensor networks (WSNs).  ...  In conclusion, we recommend using a block cipher instead of a stream cipher to encrypt data for wireless sensor network applications and using a cipher feedback scheme for the cipher operation, thereby  ...  Hence, in our research, we assume the cipher key is established in a sensor node prior to our analysis and we do not consider the effects of key establishment.  ... 
doi:10.1002/sec.375 fatcat:nvzn7ci3bjgshezjmqmfne4n7y

Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks

Xueying Zhang, Howard M. Heys, Cheng Li
2010 2010 25th Biennial Symposium on Communications  
In this paper, we focus on the energy efficiency of secure communication in wireless sensor networks (WSNs).  ...  In conclusion, we recommend using a block cipher instead of a stream cipher to encrypt data for wireless sensor network applications and using a cipher feedback scheme for the cipher operation, thereby  ...  Hence, in our research, we assume the cipher key is established in a sensor node prior to our analysis and we do not consider the effects of key establishment.  ... 
doi:10.1109/bsc.2010.5472979 fatcat:gk2ppucfpjeuvavu5226t23y4u

Data Transfer Security solution for Wireless Sensor Network

Bhavin Patel, Neha Pandya
2013 International Journal of Computer Applications Technology and Research  
In addition, when implementing a Cryptographic protocol within a sensor the energy impact of Security code must be considered.  ...  The proposed scheme is most suitable for wireless sensor networks that incorporate data centric routing protocols.  ...  In this paper Figure1 represent the model structure of wireless sensor network.  ... 
doi:10.7753/ijcatr0201.1013 fatcat:gtgls3wnlbd2jb3ssudh4w6mme

Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes

Er. Gurjot Singh, Er. Sandeep Kaur Dhanda
2014 International Journal of Information Technology and Computer Science  
In this paper, the QoS of wireless sensor network along with cryptographic schemes will be evaluated on the basis of metrics like throughput, jitter, endto-end delay, total packet received and energy consumption  ...  QoS of wireless sensor network.  ...  The asymmetric key cryptographic schemes affect the QOS of wireless sensor network more than symmetric key cryptographic schemes.  ... 
doi:10.5815/ijitcs.2014.08.05 fatcat:cx6bgheykfem3ml5ytgi25keju

Enhancing the Security of Spin Framework by Combining Min AES with Geoencryption

Usman Abdullahi Adam, Mitul Patel
2020 International journal of computer science and mobile computing  
Wireless Sensor Networks (WSNs) are of great benefits due to their low-cost, small-scale factor, smart sensor nodes.  ...  The sensors used in the Wireless Sensor Networks has the capability of sensing or monitoring an environment, measure or capture data and send it wirelessly to a control unit for further processing.  ...  Bandwidth, latency, and energy costs of TinySec are low for sensor network applications.  ... 
doi:10.47760/ijcsmc.2020.v09i10.007 fatcat:nfu2jarilfdzba5mt62jyvjkoq

Security in wireless sensor networks

Xiaojiang Du, Hsiao-Hwa Chen
2008 IEEE wireless communications  
in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes.  ...  Key management schemes are mechanisms used to establish and distribute various kinds of cryptographic keys in the network, such as individual keys, pairwise keys, and group keys.  ... 
doi:10.1109/mwc.2008.4599222 fatcat:qf4polunf5gb7hmz7how3wlppq

Trust Key Management Scheme for Wireless Body Area Networks

Mohammed Mana, Mohammed Feham, Boucif Amar Bensaber
2011 International Journal of Network Security  
This approach manages the generation and distribution of symmetric cryptographic keys to constituent sensors in a WBAN (using ECG signal) and protects the privacy.  ...  The wireless body area networks promise to revolutionize health monitoring. Since the sensors collect personal medical data, security and privacy are important components in this kind of networks.  ...  Acknowledgments The research is developed in STIC (System and Technology of Information and Communication) Laboratory, Department of telecommunications, University of Tlemcen, Tlemcen, Algeria.  ... 
dblp:journals/ijnsec/ManaFB11 fatcat:7wbq35p4vjfbflxhtwzgsynysm

Trends of Recent Secure Communication System and its Effectiveness in Wireless Sensor Network

Manjunath B, P.V. Rao
2016 International Journal of Advanced Computer Science and Applications  
sensor network.  ...  Wireless sensor network has received increasing attention from the research community since last decade due to multiple problems associated with it.  ...  FUTURE WORK Based on the research gap discussion in previous section, our future direction of the work will be focused towards cost effective security protocols in wireless sensor network.  ... 
doi:10.14569/ijacsa.2016.070918 fatcat:6vc7efmyyfbgrecyfeqe6mebde

A survey on security mechanisms and attacks in wireless sensor networks

Anser Ghazzaal Ali Alquraishee, Jayaprakash Kar
2014 Contemporary Engineerng Sciences  
The role of these tiny sensors nodes are these sense data and process. Finally formulate to organize Wireless Sensor Networks.  ...  Wireless Network Systems consists of a large number of tiny sensor nodes which are typically deployed in hostile environments where they are encountered a large variety of malicious attacks.  ...  A link-layer cryptographic primitive in sensor network simplifies the set up of cryptographic key.  ... 
doi:10.12988/ces.2014.3949 fatcat:baq7lv5egfa7xbwtb5vttydoey

An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks

Benamar Kadri, Djilalli Moussaoui, Mohammed Feham, Abdellah Mhammed
2012 Wireless Sensor Network  
of wireless sensor networks.  ...  for executing a set of handshakes intended to establish session keys between the base station and sensors over the network used for ensuring data confidentiality and integrity.  ...  Table 1 . 1 Energy cost of base station to sensor handshake. tegrity: the integrity of data deals with the possibilit6.3.  ... 
doi:10.4236/wsn.2012.46022 fatcat:rorwm3yv4vdnlgcjhpnb6mn3ci

Feasibility of PKC in resource-constrained wireless sensor networks

Al-Sakib Khan Pathan, Choong Seon Hong
2008 2008 11th International Conference on Computer and Information Technology  
In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs).  ...  In the early days of sensor networks, public key cryptography was thought to be completely unfeasible considering its computational complexity and energy requirements.  ...  The main objective of this work is to get a broad picture of the current research trend in applying high-standard cryptographic schemes in wireless sensor networks.  ... 
doi:10.1109/iccitechn.2008.4803120 fatcat:ubg6wrnqljek3kzuxhdj5ay4ku

A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs).  ...  Key management schemes are one of the core concepts that ensure the security of WSNs. Prior key management schemes failed to provide required security arrangements in WSNs.  ...  INTRODUCTION Wireless Sensor Networks is defined as the process of low-power wireless communications by combining several numbers of wireless sensor nodes.  ... 
doi:10.35940/ijitee.i7205.079920 fatcat:ze7gjtaj4jgs5blai3zyozidqe
« Previous Showing results 1 — 15 out of 5,771 results