The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the establishment of symmetric keys. A promising key distribution technique is the random predistribution of secret keys. Despite its effectiveness, this approach presents considerable memory overheads, in contrast with the limited resources of wireless sensor networks. In this paper, an in-depth analytical study is conducted on the state-of-the-art key distribution schemes based on random predistribution. A new protocol, called q-s-composite, is proposed in order to exploit the best features of random predistribution and to improve it with lower requirements. The main novelties of q-s-composite ...
Creating a secure wireless sensor network involves authenticating and encrypting messages that are s...
Key technological advances in wireless communications, Micro Electro Mechanical Systems (MEMS), and ...
Sensor networks are eligible candidates for military and scientific applications such as border secu...
In a wireless sensor network, pre-distribution of secret keys is possibly the most practical approac...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authentic...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authentic...
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems a...
Key distribution refers to the problem of establishing shared secrets on sensor nodes such that secr...
SUMMARY Security for wireless sensor networks (WSNs) has be-come an increasingly serious concern due...
Abstract. Key pre-distribution schemes are a favored solution for es-tablishing secure communication...
Data acquisition security is an important concern in wireless sensor networks. Due to energy and mem...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authen-ti...
Secure communication is a necessity for some wireless sensor network (WSN) applications. However, th...
Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical ...
Secure communication is an open challenge for Ubiquitous Sensor Network (USN) collecting valuable in...
Creating a secure wireless sensor network involves authenticating and encrypting messages that are s...
Key technological advances in wireless communications, Micro Electro Mechanical Systems (MEMS), and ...
Sensor networks are eligible candidates for military and scientific applications such as border secu...
In a wireless sensor network, pre-distribution of secret keys is possibly the most practical approac...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authentic...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authentic...
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems a...
Key distribution refers to the problem of establishing shared secrets on sensor nodes such that secr...
SUMMARY Security for wireless sensor networks (WSNs) has be-come an increasingly serious concern due...
Abstract. Key pre-distribution schemes are a favored solution for es-tablishing secure communication...
Data acquisition security is an important concern in wireless sensor networks. Due to energy and mem...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authen-ti...
Secure communication is a necessity for some wireless sensor network (WSN) applications. However, th...
Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical ...
Secure communication is an open challenge for Ubiquitous Sensor Network (USN) collecting valuable in...
Creating a secure wireless sensor network involves authenticating and encrypting messages that are s...
Key technological advances in wireless communications, Micro Electro Mechanical Systems (MEMS), and ...
Sensor networks are eligible candidates for military and scientific applications such as border secu...