Filters








74 Hits in 3.0 sec

TinyPK

Ronald Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus
<span title="">2004</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vzuoj3pepvcxxigkgo3mjm6ckm" style="color: black;">Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN &#39;04</a> </i> &nbsp;
In this paper, we describe the design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two  ...  The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices.  ...  It is the thesis of this paper that public key technology can also be very selectively deployed in the realm of sensor networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1029102.1029113">doi:10.1145/1029102.1029113</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sasn/WatroKCGLK04.html">dblp:conf/sasn/WatroKCGLK04</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ongoid2khrfz7ku7bgvpmew4q4">fatcat:ongoid2khrfz7ku7bgvpmew4q4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20051103032913/http://www.motelab.org:80/papers/TinyPK.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/48/bf4874c48e5ed4dc552f31ae9bc15b0db0cd51a1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1029102.1029113"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Security Frameworks for Wireless Sensor Networks-Review

Gaurav Sharma, Suman Bala, Anil K. Verma
<span title="">2012</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kcayf4mk7zbrbhvdwizgrxaruu" style="color: black;">Procedia Technology - Elsevier</a> </i> &nbsp;
Since WSN suffer from many constraints including lower processing power, low battery life, small memory and wireless communication channel, security becomes the main concern to deal with such kind of networks  ...  Due to significant advances in miniaturization, low power circuit design but reasonably efficient to carry the sensitive information through wireless communication, wireless sensor network (WSN) have attracted  ...  TinyPK -Watro et al., 2004 have described the design and implementation of public-key-based protocols; that allow authentication and key agreement between a sensor network and a third party as well as  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.protcy.2012.10.119">doi:10.1016/j.protcy.2012.10.119</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6vmzafrfabhlfa47iy35uhq4zm">fatcat:6vmzafrfabhlfa47iy35uhq4zm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171001000554/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/98c/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMjIxMjAxNzMxMjAwNjY0MA%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/60/e6/60e60bc102b414ceb1678543f1b4afa15f6e0bdf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.protcy.2012.10.119"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Survey of Security Technologies on Wireless Sensor Networks

Qiuwei Yang, Xiaogang Zhu, Hongjuan Fu, Xiqiang Che
<span title="">2015</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zlknqk4ahbcsthbafxw55emm7a" style="color: black;">Journal of Sensors</a> </i> &nbsp;
This paper summarized research progress of sensor network security issues as three aspects, key management, authentication, and secure routing, analyzed and commented on these results advantages and disadvantages  ...  to traditional networks, which makes wireless sensor networks face more security threats.  ...  In the security solutions for wireless sensor networks, encryption technology is the basis for a number of security technologies, by encrypting wireless sensor networks that can meet the needs of certification  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2015/842392">doi:10.1155/2015/842392</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mewhks7ppbetpi6fjq4huzgrt4">fatcat:mewhks7ppbetpi6fjq4huzgrt4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190307081100/http://pdfs.semanticscholar.org/d38f/fbeaee15bc0f5d4cd11e5966ee0fe90e7e16.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d3/8f/d38ffbeaee15bc0f5d4cd11e5966ee0fe90e7e16.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2015/842392"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture

Mariya Ouaissa, Ecole Nationale Supérieure des Arts et Métiers Moulay-Ismail University, Abdallah Rhattoy, Moulay-Ismail University
<span title="2019-02-28">2019</span> <i title="The Intelligent Networks and Systems Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hxhhpqr6nrfs5eblsflinrd2wa" style="color: black;">International Journal of Intelligent Engineering and Systems</a> </i> &nbsp;
to secure the link between sensors and achieve a high levels of security.  ...  Secondly our proposed examine the area of authentication for sensor networks by make a combination between algorithms such as TinyPK and Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in order  ...  Secure the link device to sensor using TinyPK TinyPK is focused on supporting confidentiality and authentication for wireless sensor networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22266/ijies2019.0228.16">doi:10.22266/ijies2019.0228.16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6jd4fxj6hfanlnzddhcu55lhti">fatcat:6jd4fxj6hfanlnzddhcu55lhti</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220223235611/http://www.inass.org/2019/2019022816.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4a/da/4adacc35c09524c4491c8526e9eb83cb214581bc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22266/ijies2019.0228.16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Feasibility of PKC in resource-constrained wireless sensor networks

Al-Sakib Khan Pathan, Choong Seon Hong
<span title="">2008</span> <i title="IEEE"> 2008 11th International Conference on Computer and Information Technology </i> &nbsp;
In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs).  ...  With the expense of a little energy, public key based schemes could in fact be the best choice for ensuring data security in high-security demanding WSN applications.  ...  TinyPK is a softwarebased implementation of public key system tested on UC Berkeley MICA2 motes [2] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iccitechn.2008.4803120">doi:10.1109/iccitechn.2008.4803120</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ubg6wrnqljek3kzuxhdj5ay4ku">fatcat:ubg6wrnqljek3kzuxhdj5ay4ku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809052332/http://networking.khu.ac.kr/layouts/net/publications/data/Feasibility_of_PKC_in_Resource-Constrained_Wireless_Sensor_Networks.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c6/dc/c6dcdf2d905b131e11a2664d0bd38a91bd12c15b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iccitechn.2008.4803120"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Integrated Protocols to Ensure Security Services in Wireless Sensor Networks

Mohammed Faisal, Jalal Al-Muhtadi, Abdullah Al-Dhelaan
<span title="">2013</span> <i title="SAGE Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/snvb3djywzbhvjtue42hxtjery" style="color: black;">International Journal of Distributed Sensor Networks</a> </i> &nbsp;
The proposed protocols integrate public key and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate security in next generation WSN.  ...  Thus, many security methods are trying to solve the problem of security in wireless sensor networks. Many of these methods use symmetric cryptography, and others use asymmetric cryptography.  ...  Acknowledgment This work is funded by the National Plan for Science and Technology at King Saud University, Project no. 11-INF1500-02.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2013/740392">doi:10.1155/2013/740392</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/j2rcmj4iirfkdl6jmxiweftvx4">fatcat:j2rcmj4iirfkdl6jmxiweftvx4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170815065851/http://downloads.hindawi.com/journals/ijdsn/2013/740392.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f6/98/f69844b584bca07e03f2decc09c166fde030521d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2013/740392"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

An Authentication Scheme for Clustered Wireless Sensor Networks

Li-Li HE, Xiao-Chun LOU
<span title="">2013</span> <i title="IFSA Publishing, S.L."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ro7ek4cbmjam3evzvrutssti6a" style="color: black;">Sensors &amp; Transducers</a> </i> &nbsp;
Authentication and key negotiation are the fundamental protocols to build a secure WSN. Public key algorithm and digital signature widely used in traditional networks are not very suitable for WSN.  ...  The proposed scheme is based on LU decomposition which is less computation, storage, communication cost than the schemes based on public key technology.  ...  The TinyPK system demonstrates that a public-key based protocol is feasible for an extremely lightweight sensor network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://doaj.org/article/215e73b8f8144138a5304f507a1e29d3">doaj:215e73b8f8144138a5304f507a1e29d3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/efnvo4h4crb65glj7537psi4fi">fatcat:efnvo4h4crb65glj7537psi4fi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829111121/http://www.sensorsportal.com/HTML/DIGEST/june_2013/P_1235.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/3c/be3c9649d09164d6301829ee3e2fbffba5cf1a5f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

secFleck: A Public Key Technology Platform for Wireless Sensor Networks [chapter]

Wen Hu, Peter Corke, Wen Chan Shih, Leslie Overs
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
secure large-scale sensor networks.  ...  Unlike previous software public-key implementations this approach provides E-Commerce grade security; is computationally fast, energy efficient; and has low financial cost -all essential attributes for  ...  Juanma Gonzalez Nieto (Queensland University of Technology, Australia) and the anonymous reviewers for their comments and suggestions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-00224-3_19">doi:10.1007/978-3-642-00224-3_19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s6xmuclo4rgajfezoph7umvuzm">fatcat:s6xmuclo4rgajfezoph7umvuzm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130514131827/http://www.cse.unsw.edu.au/~wenh/hu_ewsn09.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/45/db/45db4e8733803b6bf4c128b0c0e6f2b792649f19.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-00224-3_19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography

Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar
<span title="">2010</span> <i title="IEEE"> 2010 International Conference on Anti-Counterfeiting, Security and Identification </i> &nbsp;
Achieving key agreement in wireless sensor networks (WSN) is a very hard problem. Many key agreement schemes come with a shortage of considering sensor addition, revocation, and also rekeying.  ...  This paper proposes a key distribution protocol based on the public key cryptography, RSA, and DHECC. The proposed protocol does not trust individual sensors, and partially trust the Gateway.  ...  Therefore, with the fast growing technology, public key schemes are no longer impractical and will be widely used in the near future [2] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icasid.2010.5551480">doi:10.1109/icasid.2010.5551480</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nocnndjtonee7f7hfum5olgnk4">fatcat:nocnndjtonee7f7hfum5olgnk4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20101201071213/http://coeia.edu.sa/images/stories/papers/a-key-agreement-algorithm-with-rekeying-for-wireless-sensor-networks-using-public-key-cryptography.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/70/be/70beabdb004cb3eb6f3671c7ca6f6cddd5fc7bf2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icasid.2010.5551480"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks

Yusnani Mohd Yussoff, Habibah Hashim, Roszainiza Rosli, Mohd Dani Baba
<span title="">2012</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5i4djr4tgnbobnjegejzpw7nny" style="color: black;">Procedia Engineering</a> </i> &nbsp;
Wireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data gathering from unattended or hostile environment.  ...  However, in sensor network, the nodes are physically accessible by adversaries and have been known to expose cryptographic materials such as the encryption keys and other important data in the sensor nodes  ...  Sensor nodes that were pre-deployed with network information such as node identification, CA's public key, node's public and private key and signed public key will then joined the network by authenticating  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.proeng.2012.07.215">doi:10.1016/j.proeng.2012.07.215</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/chlsheeqbfc6lle2yeq4m6gppi">fatcat:chlsheeqbfc6lle2yeq4m6gppi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170928121234/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/65b/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMTg3NzcwNTgxMjAyNjE1eA%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/84/5f/845f36aaca5ed58db75ba0b1f3600f22cf888602.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.proeng.2012.07.215"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

User Revocation Mechanism for Service Oriented Wireless Adhoc Networks

Reddi Prasadu, M. Jeevan Babu, Sk. Mohammed Gouse, Debnath Bhattacharyya, Tai-hoon Kim
<span title="2016-06-30">2016</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
Security is enhanced with revocation capabilities. network management is transparent to user.  ...  New user trusts the user in the existing network and provides its IDC encrypted using the public key the existing user. Existing user decrypts the IDC using private key.  ...  The TinyPK system demonstrates that a public-key based protocol is feasible for an extremely lightweight sensor network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.6.05">doi:10.14257/ijsia.2016.10.6.05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mfhc4uf4hnbajdvj6e34d3yy6e">fatcat:mfhc4uf4hnbajdvj6e34d3yy6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604032030/http://www.sersc.org/journals/IJSIA/vol10_no6_2016/5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9d/71/9d719534fb79a3cabe4e20c13d27c3c6c5013204.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.6.05"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Enhancing the Security of Spin Framework by Combining Min AES with Geoencryption

Usman Abdullahi Adam, Mitul Patel
<span title="2020-10-19">2020</span> <i title="Zain Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6ikzxnxjvfca7lxnuzfrfzqowm" style="color: black;">International journal of computer science and mobile computing</a> </i> &nbsp;
Wireless sensor networks are contemporary technologies that are used for various purposes in different fields including military and security monitoring, home security, industrial processes/activities  ...  Here we have attempted to enhance the security of SPIN (Sensor Protocol for Information via Negotiation) framework by combining the secure cryptographic algorithm MinAES with geo-encryption.  ...  TinyPK is based on the well-known RSA cryptosystem, using e=3 as the public exponent [2, 17] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47760/ijcsmc.2020.v09i10.007">doi:10.47760/ijcsmc.2020.v09i10.007</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nfu2jarilfdzba5mt62jyvjkoq">fatcat:nfu2jarilfdzba5mt62jyvjkoq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201029015726/https://ijcsmc.com/docs/papers/October2020/V9I10202013.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/81/a2/81a23b07c4d18e105f1baf62ad36a26cf2a72802.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47760/ijcsmc.2020.v09i10.007"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Architecture Aware Key Management Scheme for Wireless Sensor Networks

Benamar KADRI, Mohammed FEHAM, Abdellah MHAMMED
<span title="2012-11-06">2012</span> <i title="MECS Publisher"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/arieir5stvdafmqjc5uirmt37i" style="color: black;">International Journal of Information Technology and Computer Science</a> </i> &nbsp;
The emergence of wireless networking as well as the development in embedded systems and technologies have given birth to application specific networks called wireless sensor networks WSNs, their flexib  ...  In this paper we are going to present a key management scheme in wh ich the base station play the role of the secure third party responsible of distributing key and managing security in the network, t  ...  The TinyPK [15] is designed specifically to allow authentication and key agreement between resource constrained sensors.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5815/ijitcs.2012.12.05">doi:10.5815/ijitcs.2012.12.05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/od5sxcxhljauxelr45nxnxz6bm">fatcat:od5sxcxhljauxelr45nxnxz6bm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428201535/http://www.mecs-press.org/ijitcs/ijitcs-v4-n12/IJITCS-V4-N12-5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/85/38/8538d6142613e9fccc66f60d7fc6f84a6089a520.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5815/ijitcs.2012.12.05"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication

Ping Guo, Jin Wang, JieZhong Zhu, YaPing Cheng, Jeong-Uk Kim
<span title="2013-09-30">2013</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
With the development of sensor network technology, more and more WSN security based on asymmetric cryptography.  ...  Sensor networks are ad hoc mobile networks that include sensor nodes with limited computational and communication capabilities.  ...  (v) high risk of physical attacks on unattended sensors Key Technologies of Constructing Trusted Wireless Sensor Networks Trusted Entity Security based on TPM The security of computer hardware platform  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2013.7.5.21">doi:10.14257/ijsia.2013.7.5.21</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uvb6wn4emrdzpmmuknl6eeldou">fatcat:uvb6wn4emrdzpmmuknl6eeldou</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604020407/http://www.sersc.org/journals/IJSIA/vol7_no5_2013/21.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/88/4e/884e5577985e0ef5c3136058108ab3b71974af39.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2013.7.5.21"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Access control in wireless sensor networks

Yun Zhou, Yanchao Zhang, Yuguang Fang
<span title="">2007</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/l3w5c2fk6bh2fiux4zxdhtupaa" style="color: black;">Ad hoc networks</a> </i> &nbsp;
Compared with conventional sensor network security solutions, our access control protocol can defend against most well-recognized attacks in sensor networks, and achieve better computation and communication  ...  In addition, each new node can establish shared keys with its neighbors during the node authentication procedure.  ...  network security technology.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.adhoc.2006.05.014">doi:10.1016/j.adhoc.2006.05.014</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kurdlayf6nhptjbenplcpmxqcm">fatcat:kurdlayf6nhptjbenplcpmxqcm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20080221202853/http://www.fang.ece.ufl.edu/mypaper/adhoc07zhou.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6e/c5/6ec50891a877879726b64d004cd686f2f4d2e7c9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.adhoc.2006.05.014"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 74 results