When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing. In order to provide a high level of security in this environment, the moving sensor node needs to be authenticated to new neighboring nodes and a key established for secure communication. The paper proposes an efficient and scalable protocol to establish and update the authentication key in a dynamic wireless sensor network environment. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) with less memory and energy cost, while not causing considerable communication overhead
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensu...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...
Confidentiality and authentication are crucial to wireless sensor networks when sensors are deployed...
Wireless sensor networks provide solutions to a range of monitoring problems. However, they introduc...
Recently, there have been exploratory growth in the research of wireless sensor network due to wide ...
With the development of Wireless Sensor Network (WSN) technology, it has been adopted in a wide vari...
Wireless sensor networks (WSNs) promise to greatly enhance and simplify the collection of sensor dat...
Sensor networks offer economically viable solutions for a wide variety of monitoring applications. I...
Mobility of sensor node in Wireless Sensor Networks (WSN) brings security issues such as re-authenti...
In this paper, we present a scalable and secure protocol for key revocation in wireless sensor netwo...
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, inc...
In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the...
For the source limitations and vulnerabilities of the sensor nodes of Wireless Sensor Networks, we p...
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensu...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...
Confidentiality and authentication are crucial to wireless sensor networks when sensors are deployed...
Wireless sensor networks provide solutions to a range of monitoring problems. However, they introduc...
Recently, there have been exploratory growth in the research of wireless sensor network due to wide ...
With the development of Wireless Sensor Network (WSN) technology, it has been adopted in a wide vari...
Wireless sensor networks (WSNs) promise to greatly enhance and simplify the collection of sensor dat...
Sensor networks offer economically viable solutions for a wide variety of monitoring applications. I...
Mobility of sensor node in Wireless Sensor Networks (WSN) brings security issues such as re-authenti...
In this paper, we present a scalable and secure protocol for key revocation in wireless sensor netwo...
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, inc...
In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the...
For the source limitations and vulnerabilities of the sensor nodes of Wireless Sensor Networks, we p...
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensu...