SM Nam, TH Cho - IEEE Transactions on Mobile Computing, 2016 - ieeexplore.ieee.org
Wireless sensor networks are widely deployed and implicitly characterized by stringent energy and computation constraints. Sensor nodes are vulnerable to false positive and false …
D Kim, D Kim, S An - KSII Transactions on Internet and Information …, 2016 - koreascience.kr
In this paper, we propose a symmetric key establishment scheme for wireless sensor networks which tries to minimize the resource usage while satisfying the security …
H Zhang, Z Xu, X Du, Z Zhou… - … and Mobile Computing, 2016 - Wiley Online Library
With the advances of sensing, wireless communication, and mobile computing, mobile crowdsourcing has become a new paradigm for data collection and retrieval that has …
P Ahlawat, M Dave - 2016 Fourth International Conference on …, 2016 - ieeexplore.ieee.org
The prevention of node capture attack is an important issue for wireless sensor network (WSN) security. Key management plays a crucial role in providing secure communication …
J Zhao - IEEE Transactions on Control of Network Systems, 2016 - ieeexplore.ieee.org
We analyze the connectivity of a heterogeneous secure sensor network that uses key predistribution to protect communications between sensors. For this network on a set V n of …
S Mi, H Han, C Chen, J Yan, X Guan - Sensors, 2016 - mdpi.com
Heterogeneous wireless sensor networks (HWSNs) can achieve more tasks and prolong the network lifetime. However, they are vulnerable to attacks from the environment or malicious …
IS Gawdan, QI Sarhan - Journal of University of Duhok, 2016 - academia.edu
Recent researches have witnessed that secret keying functionality is very important to protect wireless sensor networks from existing adversary. Based on inherited nature and …
C Ramesh, KVG Rao… - 2016 IEEE 6th International …, 2016 - ieeexplore.ieee.org
Security is one of the main challenges in Ad Hoc Mobile Networks (MANETs-Mobile Ad Hoc Networks). The natural characteristics of MANETs make these networks highly vulnerable to …
In mobile wireless sensor networks, the process of offering security to the network after computing dynamic key may result in misuse of information by malicious node. All the …