نتایج جستجو برای: random key pre

تعداد نتایج: 1106434  

Journal: :JDCTA 2008
Yoon-Su Jeong Yong-Tae Kim Gil-Cheol Park Sang Ho Lee

In WSNs, since the attacks, such as jamming or eavesdropping without physical access, easily occur, security is one of the important requirements for WSNs. The key pre-distribution scheme, recently being researched for advances of security in WSNs, distributes keys with probability with the use of qcomposite random key pre-distribution method, but there is a high probability that there is no ke...

2006
Shakir M. Hussain Naim M. Ajlouni

This study introduces a method for generating a particular permutation P of a given size N out of N! permutations from a given key. This method computes a unique permutation for a specific size since it takes the same key; therefore, the same permutation can be computed each time the same key and size are applied. The name of random permutation comes from the fact that the probability of gettin...

2007
Firdous Kausar Ashraf Masood Sajid Hussain

Key Management is a critical security service in wireless sensor networks (WSNs). It is an essential cryptographic primitive upon which other security primitives are built. The most critical security requirements in WSNs include authentication and confidentiality. These security requirements can be provided by a key management but it is difficult due to the ad hoc nature, intermittent connectiv...

2013
Li Lan Ying Yi Chun Huan Sun Jian Da Si Tie Qiang

Key management is the base of wireless sensor network security, key pre-distribution way is a high feasibility method in key management. The network connectivity rate, resilience against node capture and the storage consumption are important performance indicators in key pre-distribution way. However, most of the existing key pre-distribution schemes of wireless sensor network have the problems...

2006
Ramaraju Kalidindi B Tech

Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote environments. This makes the problem of conserving energy at individual sensor nodes challenging. S-MAC and PAMAS are two MAC protocols which periodically put nodes (selected at random) to sleep in order to achieve energy savings. Unlike these protocols, we propose an approach in which node duty...

2016

Encryption and key distribution are important primitives to build secure Wireless Sensor Networks (WSN). Different block ciphers were proposed in literature to provide encryption in resource constraint distributed networks. A large amount of different key distribution schemes were implemented, targeting different types of WSNs. These schemes face issues with respect to their requirements, imple...

Journal: :Sensors 2016
Ying Zhang Jixing Liang Bingxin Zheng Wei Chen

With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management ...

2004
John Wynne Kristie Kosaka Samir Chatterjee

Key technological advances in wireless communications, Micro Electro Mechanical Systems (MEMS), and digital circuitry have energized the research community to focus on the challenges of wireless sensor networks. In this paper, we propose a new pre-distribution key management scheme that meets the operational and security requirements of wireless sensor networks and provide authentication and ke...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید