Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS) is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme...
With rapid development and extensive use of wireless sensor networks (WSNs), it is urgent to enhance...
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WS...
Since the multi-user broadcast authentication protocol in current WSN cannot provide strong safety, ...
Security problem is one of the most popular research fields in wireless sensor networks for both the...
Internet of Things (IoT) and Wireless Sensor Networks (WSN) are emerging technologies that face many...
Summary. Key Management is a critical security service in wireless sensor net-works (WSNs). It is an...
International audienceThe use of wireless sensor networks (WSNs) in any real-world application requi...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mo...
Sensor networks are ad-hoc mobile networks that include sensor nodes with limited computational and ...
Recently, there have been exploratory growth in the research of wireless sensor network due to wide ...
In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the...
In wireless sensor networks (WSNs), secret shared keys must be established with the neighboring node...
In this paper we presenta key management approach for wireless sensor networks. This approach facili...
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WS...
With rapid development and extensive use of wireless sensor networks (WSNs), it is urgent to enhance...
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WS...
Since the multi-user broadcast authentication protocol in current WSN cannot provide strong safety, ...
Security problem is one of the most popular research fields in wireless sensor networks for both the...
Internet of Things (IoT) and Wireless Sensor Networks (WSN) are emerging technologies that face many...
Summary. Key Management is a critical security service in wireless sensor net-works (WSNs). It is an...
International audienceThe use of wireless sensor networks (WSNs) in any real-world application requi...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mo...
Sensor networks are ad-hoc mobile networks that include sensor nodes with limited computational and ...
Recently, there have been exploratory growth in the research of wireless sensor network due to wide ...
In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the...
In wireless sensor networks (WSNs), secret shared keys must be established with the neighboring node...
In this paper we presenta key management approach for wireless sensor networks. This approach facili...
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WS...
With rapid development and extensive use of wireless sensor networks (WSNs), it is urgent to enhance...
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WS...
Since the multi-user broadcast authentication protocol in current WSN cannot provide strong safety, ...