A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
The energy cost of cryptographic key establishment in wireless sensor networks
2007
Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. ...
In this paper we analyze and compare the energy cost of two different protocols for authenticated key establishment. ...
ACKNOWLEDGEMENTS The authors are grateful to Erkay Savaş and Ingrid Verbauwhede for valuable comments on a draft version of this paper. ...
doi:10.1145/1229285.1229334
dblp:conf/ccs/GrossschadlST07
fatcat:z36lp7i6crdrlocgovkadk5u7m
Secure and Energy-Efficient Data Collection in Wireless Sensor Networks
2013
International Journal of Distributed Sensor Networks
Gu et al. has proposed a braid-based signcryption scheme and developed a key establishment protocol for wireless sensor networks. ...
Wireless sensor networks (WSNs) are a kind of multihop and self-organizing networks formed by the way of wireless communication and composed by a large number of lowcost microsensor nodes deployed in the ...
have been published in this special issue or not on account of the space limitations. ...
doi:10.1155/2013/565076
fatcat:bzpnohxzkbhunbkiuseo3m4yqu
Collaborative Key Exchange System Based on Chinese Remainder Theorem in Heterogeneous Wireless Sensor Networks
2015
International Journal of Distributed Sensor Networks
IPv6 over Low Power Wireless Personal Area Networks (6LoWPANs), in the next generation of wireless sensor networks, represent an emerging field which can be integrated with Internet technology. ...
In this work, we first axed our research to propose a new end-to-end security scheme for IP enabled sensor networks to optimize battery energy consumption and then we adapted the Internet Key Exchange ...
Acknowledgments This work has been supported by the "Haute-Normandie" Regional Council and the European institutions by the FEDER program. ...
doi:10.1155/2015/159518
fatcat:yucvcjbwzngz5l656r7ufrj5we
Energy efficiency of encryption schemes applied to wireless sensor networks
2011
Security and Communication Networks
In this paper, we focus on the energy efficiency of secure communication in wireless sensor networks (WSNs). ...
In conclusion, we recommend using a block cipher instead of a stream cipher to encrypt data for wireless sensor network applications and using a cipher feedback scheme for the cipher operation, thereby ...
Hence, in our research, we assume the cipher key is established in a sensor node prior to our analysis and we do not consider the effects of key establishment. ...
doi:10.1002/sec.375
fatcat:nvzn7ci3bjgshezjmqmfne4n7y
Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks
2010
2010 25th Biennial Symposium on Communications
In this paper, we focus on the energy efficiency of secure communication in wireless sensor networks (WSNs). ...
In conclusion, we recommend using a block cipher instead of a stream cipher to encrypt data for wireless sensor network applications and using a cipher feedback scheme for the cipher operation, thereby ...
Hence, in our research, we assume the cipher key is established in a sensor node prior to our analysis and we do not consider the effects of key establishment. ...
doi:10.1109/bsc.2010.5472979
fatcat:gk2ppucfpjeuvavu5226t23y4u
Data Transfer Security solution for Wireless Sensor Network
2013
International Journal of Computer Applications Technology and Research
In addition, when implementing a Cryptographic protocol within a sensor the energy impact of Security code must be considered. ...
The proposed scheme is most suitable for wireless sensor networks that incorporate data centric routing protocols. ...
In this paper Figure1 represent the model structure of wireless sensor network. ...
doi:10.7753/ijcatr0201.1013
fatcat:gtgls3wnlbd2jb3ssudh4w6mme
Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes
2014
International Journal of Information Technology and Computer Science
In this paper, the QoS of wireless sensor network along with cryptographic schemes will be evaluated on the basis of metrics like throughput, jitter, endto-end delay, total packet received and energy consumption ...
QoS of wireless sensor network. ...
The asymmetric key cryptographic schemes affect the QOS of wireless sensor network more than symmetric key cryptographic schemes. ...
doi:10.5815/ijitcs.2014.08.05
fatcat:cx6bgheykfem3ml5ytgi25keju
Enhancing the Security of Spin Framework by Combining Min AES with Geoencryption
2020
International journal of computer science and mobile computing
Wireless Sensor Networks (WSNs) are of great benefits due to their low-cost, small-scale factor, smart sensor nodes. ...
The sensors used in the Wireless Sensor Networks has the capability of sensing or monitoring an environment, measure or capture data and send it wirelessly to a control unit for further processing. ...
Bandwidth, latency, and energy costs of TinySec are low for sensor network applications. ...
doi:10.47760/ijcsmc.2020.v09i10.007
fatcat:nfu2jarilfdzba5mt62jyvjkoq
Security in wireless sensor networks
2008
IEEE wireless communications
in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. ...
Key management schemes are mechanisms used to establish and distribute various kinds of cryptographic keys in the network, such as individual keys, pairwise keys, and group keys. ...
doi:10.1109/mwc.2008.4599222
fatcat:qf4polunf5gb7hmz7how3wlppq
Trust Key Management Scheme for Wireless Body Area Networks
2011
International Journal of Network Security
This approach manages the generation and distribution of symmetric cryptographic keys to constituent sensors in a WBAN (using ECG signal) and protects the privacy. ...
The wireless body area networks promise to revolutionize health monitoring. Since the sensors collect personal medical data, security and privacy are important components in this kind of networks. ...
Acknowledgments The research is developed in STIC (System and Technology of Information and Communication) Laboratory, Department of telecommunications, University of Tlemcen, Tlemcen, Algeria. ...
dblp:journals/ijnsec/ManaFB11
fatcat:7wbq35p4vjfbflxhtwzgsynysm
Trends of Recent Secure Communication System and its Effectiveness in Wireless Sensor Network
2016
International Journal of Advanced Computer Science and Applications
sensor network. ...
Wireless sensor network has received increasing attention from the research community since last decade due to multiple problems associated with it. ...
FUTURE WORK Based on the research gap discussion in previous section, our future direction of the work will be focused towards cost effective security protocols in wireless sensor network. ...
doi:10.14569/ijacsa.2016.070918
fatcat:6vc7efmyyfbgrecyfeqe6mebde
A survey on security mechanisms and attacks in wireless sensor networks
2014
Contemporary Engineerng Sciences
The role of these tiny sensors nodes are these sense data and process. Finally formulate to organize Wireless Sensor Networks. ...
Wireless Network Systems consists of a large number of tiny sensor nodes which are typically deployed in hostile environments where they are encountered a large variety of malicious attacks. ...
A link-layer cryptographic primitive in sensor network simplifies the set up of cryptographic key. ...
doi:10.12988/ces.2014.3949
fatcat:baq7lv5egfa7xbwtb5vttydoey
An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks
2012
Wireless Sensor Network
of wireless sensor networks. ...
for executing a set of handshakes intended to establish session keys between the base station and sensors over the network used for ensuring data confidentiality and integrity. ...
Table 1 . 1 Energy cost of base station to sensor handshake. tegrity: the integrity of data deals with the possibilit6.3. ...
doi:10.4236/wsn.2012.46022
fatcat:rorwm3yv4vdnlgcjhpnb6mn3ci
Feasibility of PKC in resource-constrained wireless sensor networks
2008
2008 11th International Conference on Computer and Information Technology
In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs). ...
In the early days of sensor networks, public key cryptography was thought to be completely unfeasible considering its computational complexity and energy requirements. ...
The main objective of this work is to get a broad picture of the current research trend in applying high-standard cryptographic schemes in wireless sensor networks. ...
doi:10.1109/iccitechn.2008.4803120
fatcat:ubg6wrnqljek3kzuxhdj5ay4ku
A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs). ...
Key management schemes are one of the core concepts that ensure the security of WSNs. Prior key management schemes failed to provide required security arrangements in WSNs. ...
INTRODUCTION Wireless Sensor Networks is defined as the process of low-power wireless communications by combining several numbers of wireless sensor nodes. ...
doi:10.35940/ijitee.i7205.079920
fatcat:ze7gjtaj4jgs5blai3zyozidqe
« Previous
Showing results 1 — 15 out of 5,771 results