Grouping Sensors for the Key Distribution of Implicit Certificates in Wireless Sensor Networks

RI Chang, CW Chiang, YH Hung - Electronics, 2023 - mdpi.com
As sensor nodes communicate via wireless channels, information security is essential for
wireless sensor networks. Efficient protection mechanisms to ensure data security among …

Replication attack on random key pre-distribution schemes for wireless sensor networks

H Fu, S Kawamura, M Zhang, L Zhang - Computer Communications, 2008 - Elsevier
When setting up a sensor network, one of the first requirements is to establish cryptographic
keys for later use. However, the traditional key establishment techniques cannot be directly …

Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks.

J Yan, J Ma, F Li, SJ Moon - Adhoc & Sensor Wireless …, 2010 - search.ebscohost.com
Wireless sensor networks are often deployed in hostile environments. The low cost sensor
nodes may be captured and the sensitive information such as communication keys stored in …

Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network

L Feng, Z Li, Y Zhang - Journal of network and computer applications, 2009 - Elsevier
Setting up a security module into a Mobile Ad Hoc Network (MANET) before its deployment
is very crucial to its future security assurance. It can establish a solid network security shield …

[PDF][PDF] Grouping Sensors for the Key Distribution of Implicit Certificates in Wireless Sensor Networks. Electronics 2023, 12, 2815

RI Chang, CW Chiang, YH Hung - Security and Privacy for Modern …, 2023 - core.ac.uk
As sensor nodes communicate via wireless channels, information security is essential for
wireless sensor networks. Efficient protection mechanisms to ensure data security among …

Trusted transport mode based cluster-Merkle-tree for wireless sensor networks

Z Quan, F Gui, D Xiao, J Li - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
Wireless sensors networks (WSNs) are susceptible because of its characters. The traditional
security mechanisms can not be use to protect the WSNs. In the paper, a trusted transport …

Leveled group key management with efficient revocations for wireless sensor networks

F Li, J Yan, J Ma, W Wang - Chinese Journal of Electronics, 2009 - ieeexplore.ieee.org
Wireless sensor networks are often deployed in hostile environments. Protecting the
communication against node capture is one of the most important design objectives …

A misused key detection mechanism using the token in Wireless Sensor Networks

DM Kang, M Park, YJ Han, SH Park… - 2010 The 12th …, 2010 - ieeexplore.ieee.org
In Wireless Sensor Networks, key management is required to offer a secure communication
between sensor nodes. Many key management mechanisms have been proposed while …

Energy Efficient Secure Key Management Schemes for WSNs and IoT

W Wen - 2016 - ruor.uottawa.ca
Secret sharing is critical to most applications making use of security and remains one of the
most challenging research areas in modern cryptography. In this thesis, we propose a novel …

[引用][C] 一种无状态的传感器网络密钥预分配方案

阎军智, 李凤华, 马建峰 - 电子学报, 2009