A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks

CJ Antosh, BE Mullins, RO Baldwin… - … of Autonomous and …, 2010 - inderscienceonline.com
As wireless sensor networks (WSNs) become more prolific, the need to secure their
communications increases. This paper describes the impact of using three rekey protocols …

[PDF][PDF] EFFECTIVE RANKED INFORMATION-CENTRIC REPOSITORY AND LOAD BALANCED IN SENSOR NETWORKS

SS Reddy, SS Kirubakaran - International Journal of Pure and …, 2018 - academia.edu
A remote sensor system can get isolated into various associated parts because of the
disappointment of some of its hubs, which is known as a" cut". In this article we consider the …

A Research Study on different Key Management Strategies for Large Scale WSNs

MN Premakumar, S Ramesh - Communications on Applied …, 2018 - caeaccess.org
A wireless sensor network technology is immensely utilizing in multiple fields, for example;
physical environment monitoring, surveillance systems, object tracking systems, robotic …

A novel randomized dispersive routing mechanism for securing data in wireless senor networks

N Sainath - … Conference on Intelligent Computing and Control …, 2017 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) are rising as new stage in the IT ecosystem and in rich
field of active research involving hardware and system design, distributed algorithms …

Client Puzzle Approach for Securing Aggregated Data in Wireless Sensor Network

PP Mukartihal, DI Hatti - 2017 IEEE 7th International Advance …, 2017 - ieeexplore.ieee.org
Acquiring security in the event of aggregated data in wireless sensor network is challenging
task because of its limitations in terms of calculation, resources, battery power, transmission …

Secure data collection in wireless sensor networks

W Alghamdi - 2017 - unsworks.unsw.edu.au
Sensor nodes have limited processing power, small storage capacity and limited energy.
These constraints make classical security algorithms unsuitable for WSNs (Wireless Sensor …

[PDF][PDF] DISTINCT PATH ROUTING FOR SAFE DATA TRANSFER IN WIRELESS SENSOR NETWORKS

KV BHAVIKA, VR PRAKASH - academia.edu
Distinct-path routing establishes distinct paths between a source and destination node in a
network. In order to achieve efficient, secure and reliable distinct-path routing for Wireless …

[PDF][PDF] Randomized Multipath Routing [RMR] for Secure Data Exchange in Ad Hoc Wireless Networks

H Santhi, N Jaisankar - ijtrd.com
Ad hoc wireless network is a collection of nodes that is connected through a wireless
medium forming a rapidly changing network topologies, ad hoc wireless network is a …

Communication Cost Optimized Session Key Transmission Scheme For WSN Based On Non-perfect Secret Sharing

ZX Lan, GM Xia, AL Zhou - Applied Mechanics and Materials, 2014 - Trans Tech Publ
With the extensively applying of Wireless Sensor Networks (WSN), its' security drew more
and more attention. In all the security issues in WSN, session key is fundamental one with …

[PDF][PDF] International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net

M Malhotra, L Kumar - International Journal of Emerging …, 2014 - academia.edu
An encryption scheme based on the integration of Enhanced RSA and Elgamal algorithm is
introduced. Enhanced RSA algorithm is based on Integer Factorization Problem (IFP). On …