Securing sensor networks, which have extensive military applications, is very challenging. Sensor networks are usually deployed in an untrusted environment. Hence, homogeneity of nodes makes the system vulnerable to large scale security attacks, because compromising one gives enough information to compromise other nodes. Diversifying sensor nodes in a network is a promising solution. In this thesis, three techniques for diversification are presented. The first technique is for diversifying highly constrained sensor networks with known topology. The constraints are based on nodes, software, and links. This technique can be applied to sensor networks as well as general networks. The second technique is for diversifying communication links in ...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authen-ti...
Resource constraints of the nodes make security protocols difficult to implement. Thus key managemen...
Data acquisition security is an important concern in wireless sensor networks. Due to energy and mem...
Abstract — Wireless sensor network (WSN) has a wide range of applications in military as well as in ...
Purpose- Random key pre-distribution schemes are vulnerable to collusion attacks. The purpose of thi...
Key distribution refers to the problem of establishing shared secrets on sensor nodes such that secr...
Secure communication is a necessity for some wireless sensor network (WSN) applications. However, th...
Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical ...
Sensor nodes are low power, tiny, and computationally restricted microelectromechanical devices that...
In order to provide security services in wireless sensor networks, a well-known task is to provide c...
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and ...
previous research on sensor network security mainly considers homogeneous sensor networks, where all...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent...
Many applications that make use of sensor networks require secure communication. Be-cause asymmetric...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authen-ti...
Resource constraints of the nodes make security protocols difficult to implement. Thus key managemen...
Data acquisition security is an important concern in wireless sensor networks. Due to energy and mem...
Abstract — Wireless sensor network (WSN) has a wide range of applications in military as well as in ...
Purpose- Random key pre-distribution schemes are vulnerable to collusion attacks. The purpose of thi...
Key distribution refers to the problem of establishing shared secrets on sensor nodes such that secr...
Secure communication is a necessity for some wireless sensor network (WSN) applications. However, th...
Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical ...
Sensor nodes are low power, tiny, and computationally restricted microelectromechanical devices that...
In order to provide security services in wireless sensor networks, a well-known task is to provide c...
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and ...
previous research on sensor network security mainly considers homogeneous sensor networks, where all...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent...
Many applications that make use of sensor networks require secure communication. Be-cause asymmetric...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authen-ti...
Resource constraints of the nodes make security protocols difficult to implement. Thus key managemen...
Data acquisition security is an important concern in wireless sensor networks. Due to energy and mem...