In wireless sensor networks, the messages between pairs of communicating nodes are open to eavesdropping, tampering, and forgeries. These messages can easily be protected using cryptographic means but the nodes need to share a common secret pairwise key. This thesis proposes a new scheme, the Blom-Yang key agreement (BYka) scheme, that enables pairs of sensor nodes in large networks to compute their pairwise keys quickly and efficiently. Prior to deployment, the Trusted Authority (TA), assigns each node their public IDs, and using its master keys, computes and stores in the nodes their private key-sets. When a pair of nodes need to obtain their pairwise keys, they exchange their public key identifier IDs which are just 16-bit integers. Us...
[[abstract]]To make wireless sensor network more suitable in practical use, researchers have to deve...
Despite much research effort key distribution in Wireless Sensor Networks (WSNs) still remains an op...
Public key operations were considered impractical for wireless sensor networks due to their high com...
We propose a new authenticated key agreement scheme based on Blom’s scheme, but using multiple maste...
Abstract: We propose a new authenticated key agreement scheme based on Blom’s scheme, but using mult...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
This paper contributes to the challenging field of security for wireless sensor networks by introduc...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authentic...
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authen-ti...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...
Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challeng...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authentic...
Part 2: Data SecurityInternational audienceThe security of the Multiple-Key Blom’s (MKB) key agreeme...
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
[[abstract]]To make wireless sensor network more suitable in practical use, researchers have to deve...
Despite much research effort key distribution in Wireless Sensor Networks (WSNs) still remains an op...
Public key operations were considered impractical for wireless sensor networks due to their high com...
We propose a new authenticated key agreement scheme based on Blom’s scheme, but using multiple maste...
Abstract: We propose a new authenticated key agreement scheme based on Blom’s scheme, but using mult...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
This paper contributes to the challenging field of security for wireless sensor networks by introduc...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authentic...
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authen-ti...
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving...
Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challeng...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authentic...
Part 2: Data SecurityInternational audienceThe security of the Multiple-Key Blom’s (MKB) key agreeme...
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
[[abstract]]To make wireless sensor network more suitable in practical use, researchers have to deve...
Despite much research effort key distribution in Wireless Sensor Networks (WSNs) still remains an op...
Public key operations were considered impractical for wireless sensor networks due to their high com...