Comparative study on various authentication protocols in wireless sensor networks

SR Rajeswari, V Seenivasagam - The Scientific World Journal, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power,
and short‐ranged wireless communication. The sensors can communicate with each other …

Context-aware architecture for probabilistic voting-based filtering scheme in sensor networks

SM Nam, TH Cho - IEEE Transactions on Mobile Computing, 2016 - ieeexplore.ieee.org
Wireless sensor networks are widely deployed and implicitly characterized by stringent
energy and computation constraints. Sensor nodes are vulnerable to false positive and false …

[PDF][PDF] Communication pattern based key establishment scheme in heterogeneous wireless sensor networks

D Kim, D Kim, S An - KSII Transactions on Internet and Information …, 2016 - koreascience.kr
In this paper, we propose a symmetric key establishment scheme for wireless sensor
networks which tries to minimize the resource usage while satisfying the security …

CAPR: context‐aware participant recruitment mechanism in mobile crowdsourcing

H Zhang, Z Xu, X Du, Z Zhou… - … and Mobile Computing, 2016 - Wiley Online Library
With the advances of sensing, wireless communication, and mobile computing, mobile
crowdsourcing has become a new paradigm for data collection and retrieval that has …

An improved hybrid key management scheme for wireless sensor networks

P Ahlawat, M Dave - 2016 Fourth International Conference on …, 2016 - ieeexplore.ieee.org
The prevention of node capture attack is an important issue for wireless sensor network
(WSN) security. Key management plays a crucial role in providing secure communication …

Analyzing connectivity of heterogeneous secure sensor networks

J Zhao - IEEE Transactions on Control of Network Systems, 2016 - ieeexplore.ieee.org
We analyze the connectivity of a heterogeneous secure sensor network that uses key
predistribution to protect communications between sensors. For this network on a set V n of …

A secure scheme for distributed consensus estimation against data falsification in heterogeneous wireless sensor networks

S Mi, H Han, C Chen, J Yan, X Guan - Sensors, 2016 - mdpi.com
Heterogeneous wireless sensor networks (HWSNs) can achieve more tasks and prolong the
network lifetime. However, they are vulnerable to attacks from the environment or malicious …

[PDF][PDF] Performance evaluation of novel secure key management scheme over ban wireless sensor networks

IS Gawdan, QI Sarhan - Journal of University of Duhok, 2016 - academia.edu
Recent researches have witnessed that secret keying functionality is very important to
protect wireless sensor networks from existing adversary. Based on inherited nature and …

Evaluation of key management scheme based on identity

C Ramesh, KVG Rao… - 2016 IEEE 6th International …, 2016 - ieeexplore.ieee.org
Security is one of the main challenges in Ad Hoc Mobile Networks (MANETs-Mobile Ad Hoc
Networks). The natural characteristics of MANETs make these networks highly vulnerable to …

Secure clustering and routing for heterogeneous mobile wireless sensor networks with dynamic key management

V Thiruppathy Kesavan… - Journal of Experimental & …, 2016 - Taylor & Francis
In mobile wireless sensor networks, the process of offering security to the network after
computing dynamic key may result in misuse of information by malicious node. All the …