[[abstract]]To support secure group communications in resource-constrained wireless sensor networks, we propose an efficient and scalable key management protocol which only uses symmetric cryptographic algorithms and low cost operations. Our protocol can achieve current, forward and backward secrecy. Furthermore, for scalability, the communication and computation cost for master key renewing can be confined to the affected cluster. Our protocol provides better efficiency and is more suitable than the previous master key management protocols for wireless sensor networks.[[fileno]]2030230030051[[department]]資訊工程學
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
As wireless sensor networks grow, so does the need for effective security mechanisms. We propose a c...
Wireless Sensor Networks (WSNs) are a newly developed networking technology consisting of multifunct...
In sensor networks, large numbers of tiny sensor nodes communicate remotely or locally among themsel...
Abstract—A major issue in many applications of Wireless Sensor Networks (WSNs) is ensuring security....
Abstract: Problem statement: Key management is an important cryptographic technique for providing se...
With reference to a network of agents equipped with small low-cost processing units and wireless sho...
In this paper, we present a scalable and secure protocol for key revocation in wireless sensor netwo...
Abstract: The group key management technique is an important technique for cryptographic application...
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography...
In this paper, an energy-efficient hybrid key management (EHKM) protocol is proposed in which the he...
In this paper, we present a scalable and secure proto-col for key revocation in Wireless Sensor Netw...
Key management play a central role for protecting communication in WSNs. Due to the limited memory r...
The security of wireless sensor networks (WSNs) is a big challenge due to their resource-constraint ...
Recently, there have been exploratory growth in the research of wireless sensor network due to wide ...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
As wireless sensor networks grow, so does the need for effective security mechanisms. We propose a c...
Wireless Sensor Networks (WSNs) are a newly developed networking technology consisting of multifunct...
In sensor networks, large numbers of tiny sensor nodes communicate remotely or locally among themsel...
Abstract—A major issue in many applications of Wireless Sensor Networks (WSNs) is ensuring security....
Abstract: Problem statement: Key management is an important cryptographic technique for providing se...
With reference to a network of agents equipped with small low-cost processing units and wireless sho...
In this paper, we present a scalable and secure protocol for key revocation in wireless sensor netwo...
Abstract: The group key management technique is an important technique for cryptographic application...
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography...
In this paper, an energy-efficient hybrid key management (EHKM) protocol is proposed in which the he...
In this paper, we present a scalable and secure proto-col for key revocation in Wireless Sensor Netw...
Key management play a central role for protecting communication in WSNs. Due to the limited memory r...
The security of wireless sensor networks (WSNs) is a big challenge due to their resource-constraint ...
Recently, there have been exploratory growth in the research of wireless sensor network due to wide ...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
As wireless sensor networks grow, so does the need for effective security mechanisms. We propose a c...
Wireless Sensor Networks (WSNs) are a newly developed networking technology consisting of multifunct...