منابع مشابه
Key management system for WSNs based on hash functions and elliptic curve cryptography
Due to hostile environment and wireless communication channel, security mechanisms are essential for wireless sensor networks (WSNs). Existence of a pair of shared key is a prerequisite for many of these security mechanisms; a task that key management system addresses. Recently, an energy efficient method based on public key cryptography (PKC) was proposed. We analyze this protocol and show tha...
متن کاملA Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs
Security is a critical and vital task in wireless sensor networks (WSNs), therefore different key management systems have been proposed, many of which are based on symmetric cryptography. Such systems are very energy efficient, but they lack some other desirable characteristics. On the other hand, systems based on public key cryptography (PKC) have those desirable characteristics, but they cons...
متن کاملA Paired Key Mechanism for WirelessLink Security for WSNs
Mtech Student, lecturer Computer Science & Enggineering,Kharar, India ----------------------------------------------------------------------***-----------------------------------------------------------------------Abstract The wireless sensor network has been used in many applications for military, weather, industrial or many other industries. The wireless sensor networks are consisted of the l...
متن کاملA Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management ...
متن کاملSoftware engineering: Redundancy is key
Software engineers are humans and so they make lots of mistakes. Typically 1 out of 10 to 100 tasks go wrong. The only way to avoid these mistakes is to introduce redundancy in the software engineering process. This article is a plea to consciously introduce several levels of redundancy for each programming task. Depending on the required level of correctness, expressed in a residual error prob...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cryptography
سال: 2018
ISSN: 2410-387X
DOI: 10.3390/cryptography2040040