A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks

AK Das - International journal of information security, 2012 - Springer
Several symmetric-key distribution mechanisms are proposed in the literature, but most of
them are not scalable or they are vulnerable to a small number of captured nodes. In this …

Group-based intrusion detection system in wireless sensor networks

G Li, J He, Y Fu - Computer Communications, 2008 - Elsevier
Many mission critical wireless sensor networks require an efficient, lightweight and flexible
intrusion detection algorithm to identify malicious attackers. In this paper, we propose a …

[PDF][PDF] A forward authentication key management scheme for heterogeneous sensor networks

JY Huang, IE Liao, HW Tang - EURASIP Journal on Wireless …, 2011 - Springer
Key encryption technology is a basic technique for protecting the secrecy of transmitted data
among sensor nodes in wireless sensor networks. However, sensor nodes are inherently …

Efficient and secure key distribution protocol for wireless sensor networks

MR Alshammari, KM Elleithy - Sensors, 2018 - mdpi.com
Modern wireless sensor networks have adopted the IEEE 802.15. 4 standard. This standard
defines the first two layers, the physical and medium access control layers; determines the …

[PDF][PDF] Trust based service optimization selection for cloud computing

X Li, J He, Y Du - International Journal of Multimedia and …, 2015 - scholar.archive.org
We present an approach for privacy preservation in cloud computing environment in which
we propose to use information entropy and rough set theory with the goal of personalized …

[PDF][PDF] Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks.

AK Das - Int. J. Netw. Secur., 2012 - ijns.jalaxy.com.tw
In this paper, we propose a novel identity-based random key pre-distribution scheme called
the identity based key pre-distribution using a pseudo random function (IBPRF), which has …

An efficient random key distribution scheme for large‐scale distributed sensor networks

AK Das - Security and Communication Networks, 2011 - Wiley Online Library
Key establishment in sensor networks is a challenging problem because of resource
constraints of the sensors. Due to resource limitations and vulnerable to physical capture of …

On the perceptual organization of texture and shading flows: From a geometrical model to coherence computation

O Ben-Shahar, SW Zucker - Proceedings of the 2001 IEEE …, 2001 - ieeexplore.ieee.org
Locally parallel dense patterns-sometimes called texture flows define a perceptually
coherent structure which is important to image segmentation, edge classification, shading …

[PDF][PDF] A GA-based key-management scheme in hierarchical wireless sensor networks

CL Wang, TP Hong, G Horng… - International Journal of …, 2009 - researchgate.net
In this paper, we propose a novel key management scheme based on genetic algorithms to
fulfill the requirement of power control, memory usage, and computation security in a …

Re-keying analysis in group key management of wireless sensor networks

P Kumari, KR Singh - Cryptography and Communications, 2024 - Springer
The exclusion basis system is a combinatorial formulation of group key management that
provides long-term and flexible protection for wireless sensor networks while allowing for …