In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and cryptography try to find new ways to increase efficiency and security of wireless sensor networks. Improving computational power of sensors used in wireless sensor networks made application of public key cryptography in WSN possible. Identity based cryptography is one important type of public key cryptography which using some bilinear functions called pairing functions was seriously applied. In this paper we will look at some researches done to find how to use pairings in wireless sensor netw...
In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSN...
In spite of several years of intense research, the area of security and cryptography in Wireless Sen...
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a co...
It is envisaged that the use of cheap and tiny wireless sensors will soon bring a third wave of evol...
Abstract—Computing Bilinear Pairing on sensor platforms has become an important research topic since...
In spite of several years of intense research, the area of security and cryptography in Wireless Sen...
In recent years, wireless sensor networks have been used in a variety of environments; a wireless ne...
[[abstract]]To make wireless sensor network more suitable in practical use, researchers have to deve...
Abstract- Wireless sensor networks (WSN) are usually deployed in hostile environments, which having ...
This paper describes an efficient and secure online and off-line signature scheme for wireless senso...
End to end secure data aggregation scheme for wireless sensor networks that are based on public key ...
As most nodes of wireless sensor networks are not very powerful in regard to computational operation...
A wireless sensor is a small, low-cost, low-powered device with sensing, wireless communication, and...
Abstract—Wireless Sensor Network(WSN) are consists of large number of low power sensor nodes. Securi...
Wireless sensor networks normally employ symmetric cryptography in their security systems. The most ...
In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSN...
In spite of several years of intense research, the area of security and cryptography in Wireless Sen...
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a co...
It is envisaged that the use of cheap and tiny wireless sensors will soon bring a third wave of evol...
Abstract—Computing Bilinear Pairing on sensor platforms has become an important research topic since...
In spite of several years of intense research, the area of security and cryptography in Wireless Sen...
In recent years, wireless sensor networks have been used in a variety of environments; a wireless ne...
[[abstract]]To make wireless sensor network more suitable in practical use, researchers have to deve...
Abstract- Wireless sensor networks (WSN) are usually deployed in hostile environments, which having ...
This paper describes an efficient and secure online and off-line signature scheme for wireless senso...
End to end secure data aggregation scheme for wireless sensor networks that are based on public key ...
As most nodes of wireless sensor networks are not very powerful in regard to computational operation...
A wireless sensor is a small, low-cost, low-powered device with sensing, wireless communication, and...
Abstract—Wireless Sensor Network(WSN) are consists of large number of low power sensor nodes. Securi...
Wireless sensor networks normally employ symmetric cryptography in their security systems. The most ...
In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSN...
In spite of several years of intense research, the area of security and cryptography in Wireless Sen...
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a co...