Abstract—This paper presents the design, implementation and evaluation of an automated method for distributing symmetric cryptographic keys in a Wireless Sensor Network (WSN). Unlike previous methods for key distribution in WSNs, we do not rely on sensitive knowledge to be stored in program memory prior to network deployment. Additionally, the protocol proposed uses dominant security primitives to ensure strong security and interoperability with existing networks (such as the Internet), while operating independent of the network layer protocol. Through both hardware experimentation and simulation, we show that this protocol can provide strong confidentiality, in-tegrity and authenticity protection to the symmetric keys as they are distribut...
peer-reviewedThere has been a significant increase in the implementation of wireless sensor networks...
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a co...
Sensor networks are eligible candidates for military and scientific applications such as border secu...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Abstract—A major issue in many applications of Wireless Sensor Networks (WSNs) is ensuring security....
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
Wireless sensor networks normally employ symmetric cryptography in their security systems. The most ...
Wireless sensors are an important facilitator for the Internet of Things. These embedded devices can...
Creating a secure wireless sensor network involves authenticating and encrypting messages that are s...
Empirical thesis.Bibliography: pages 48-52.Chapter 1. Introduction -- Chapter 2. Background -- Chapt...
There has been a significant increase in the implementation of wireless sensor networks (WSNs) in di...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...
In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSN...
peer-reviewedThere has been a significant increase in the implementation of wireless sensor networks...
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a co...
Sensor networks are eligible candidates for military and scientific applications such as border secu...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Abstract—A major issue in many applications of Wireless Sensor Networks (WSNs) is ensuring security....
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
Wireless sensor networks normally employ symmetric cryptography in their security systems. The most ...
Wireless sensors are an important facilitator for the Internet of Things. These embedded devices can...
Creating a secure wireless sensor network involves authenticating and encrypting messages that are s...
Empirical thesis.Bibliography: pages 48-52.Chapter 1. Introduction -- Chapter 2. Background -- Chapt...
There has been a significant increase in the implementation of wireless sensor networks (WSNs) in di...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...
In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSN...
peer-reviewedThere has been a significant increase in the implementation of wireless sensor networks...
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a co...
Sensor networks are eligible candidates for military and scientific applications such as border secu...