In this work the suitability of different methods of symmetric key distribution for application in wireless sensor networks are discussed. Each method is considered in terms of its security implications for the network. It is concluded that an asymmetric scheme is the optimum choice for key distribution. In particular, Identity-Based Cryptography (IBC) is proposed as the most suitable of the various asymmetric approaches. A protocol for key distribution using identity based Non-Interactive Key Distribution Scheme (NIKDS) and Identity-Based Signature (IBS) scheme is presented. The protocol is analysed on the ARM920T processor and measurements were taken for the run time and energy of its components parts. It was found that the Tate pairing c...
Since the time of their introduction, Wireless Sensor Networks (WSN) have been catching the interest...
The proliferation of a range of wireless devices, from the cheap low power resource starved sensor n...
Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote...
In this work the suitability of different methods of symmetric key distribution for application in w...
In this work a scheme for key distribution and network access in a Wireless Sensor Network (WSN) tha...
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless s...
It is envisaged that the use of cheap and tiny wireless sensors will soon bring a third wave of evol...
Cryptography plays an important role in protecting the data security of wireless sensor networks (WS...
In spite of several years of intense research, the area of security and cryptography in Wireless Sen...
Wireless communication networks are highly resource-constrained; thus many security protocols which ...
Despite much research effort key distribution in Wireless Sensor Networks (WSNs) still remains an op...
A wireless sensor network (WSN) is a network made of thousands of sensing elements called as nodes w...
The use of Wireless Sensor Networks (WSNs) in different fields of our life has increased for several...
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
Since the time of their introduction, Wireless Sensor Networks (WSN) have been catching the interest...
The proliferation of a range of wireless devices, from the cheap low power resource starved sensor n...
Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote...
In this work the suitability of different methods of symmetric key distribution for application in w...
In this work a scheme for key distribution and network access in a Wireless Sensor Network (WSN) tha...
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless s...
It is envisaged that the use of cheap and tiny wireless sensors will soon bring a third wave of evol...
Cryptography plays an important role in protecting the data security of wireless sensor networks (WS...
In spite of several years of intense research, the area of security and cryptography in Wireless Sen...
Wireless communication networks are highly resource-constrained; thus many security protocols which ...
Despite much research effort key distribution in Wireless Sensor Networks (WSNs) still remains an op...
A wireless sensor network (WSN) is a network made of thousands of sensing elements called as nodes w...
The use of Wireless Sensor Networks (WSNs) in different fields of our life has increased for several...
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
Since the time of their introduction, Wireless Sensor Networks (WSN) have been catching the interest...
The proliferation of a range of wireless devices, from the cheap low power resource starved sensor n...
Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote...