Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Securing wireless sensor networks: a survey

Y Zhou, Y Fang, Y Zhang - IEEE Communications Surveys & …, 2008 - ieeexplore.ieee.org
The significant advances of hardware manufacturing technology and the development of
efficient software algorithms make technically and economically feasible a network …

A survey of security issues in wireless sensor networks

Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …

A survey of key management schemes in wireless sensor networks

Y Xiao, VK Rayi, B Sun, X Du, F Hu… - Computer …, 2007 - Elsevier
Wireless sensor networks have many applications, vary in size, and are deployed in a wide
variety of areas. They are often deployed in potentially adverse or even hostile environment …

A survey on wireless sensor network security

J Sen - arXiv preprint arXiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …

Wireless sensor network key management survey and taxonomy

J Zhang, V Varadharajan - Journal of network and computer applications, 2010 - Elsevier
Wireless sensor networks (WSN) are mobile ad hoc networks in which sensors have limited
resources and communication capabilities. Secure communications in some wireless sensor …

Combinatorial design of key distribution mechanisms for wireless sensor networks

SA Camtepe, B Yener - IEEE/ACM Transactions on networking, 2007 - ieeexplore.ieee.org
Secure communications in wireless sensor networks operating under adversarial conditions
require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment …

A survey on key management mechanisms for distributed wireless sensor networks

MA Simplício Jr, PSLM Barreto, CB Margi… - Computer …, 2010 - Elsevier
Wireless Sensor Networks (WSNs) have a vast field of applications, including deployment in
hostile environments. Thus, the adoption of security mechanisms is fundamental. However …

Combinatorial design of key distribution mechanisms for wireless sensor networks

SA Camtepe, B Yener - Computer Security–ESORICS 2004: 9th European …, 2004 - Springer
Key distribution is one of the most challenging security issues in wireless sensor networks
where sensor nodes are randomly scattered over a hostile territory. In such a sensor …

One key to rule them all: Secure group pairing for heterogeneous iot devices

H Farrukh, MO Ozmen, FK Ors… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Pairing schemes establish cryptographic keys to secure communication among IoT devices.
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …