[PDF][PDF] Energy efficient cluster based key management technique for wireless sensor networks

T Lalitha, R Umarani - International Journal of Advances in Engineering & …, 2012 - Citeseer
ABSTRACT Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which
an attacker can capture one or more sensor nodes and reveal all stored security information …

[PDF][PDF] Secure Key Management in Embedded Systems: A First Proposal.

G Jank, S Schmidt, M Koschuch - IoTBDS, 2021 - scitepress.org
The Internet-of-Things (IoT) domain is highly heterogeneous and comprises a multitude of
different devices. Because of this variety, many projects require unique compositions of …

Modified autonomous key management scheme with reduced communication/computation costs in MANET

CH Lin, CY Lee - 2010 International Conference on Complex …, 2010 - ieeexplore.ieee.org
The growing applications of Mobile Ad hoc Network (MANET) has made the security issue
increasingly more important. B. Zhu et al. proposes a key management scheme using …

[PDF][PDF] SECURING CLUSTER BASED ADHOC NETWORK THROUGH BALANCED CLUSTERING WITH DISTRIBUTION AUTHORITIES OF KEY DISTRIBUTION AND …

P Manhas, P Kaur - International Journal of Research in Engineering …, 2013 - academia.edu
In this paper, we address key management in cluster-based mobile ad hoc networks
(MANETs). We present a fully-distributed ID-based multiple secrets key management …

[PDF][PDF] Challenges and Authentication in Wireless Sensor Networks by using promising Key Management Protocols

A Jayanthiladevi, T Lalitha - International Journal of Computer Applications - Citeseer
ABSTRACT A network comprising of several minute wireless sensor nodes which are
organized in a dense manner is called as a Wireless Sensor Network (WSN). Fig. 1 …

Challenges and authentication in Wireless Sensor Networks

A Jayanthiladevi, S Suma… - … Conference on Emerging …, 2013 - ieeexplore.ieee.org
A network comprising of several minute wireless sensor nodes which are organized in a
dense manner is called as a Wireless Sensor Network (WSN). Fig 1 demonstrates the …

[引用][C] Efficient key management and authentication scheme for wireless sensor networks

T Lalitha, RS Kumar… - American Journal of …, 2014 - Science Publications

[引用][C] 一些密碼元件之分析與設計

李鎮宇, 林祝興 - 2012