Sciweavers

38 search results - page 1 / 8
» Key management for long-lived sensor networks in hostile env...
Sort
View
COMCOM
2007
95views more  COMCOM 2007»
13 years 3 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
13 years 9 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
13 years 10 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
ICOIN
2007
Springer
13 years 9 months ago
A Secure Message Percolation Scheme for Wireless Sensor Network
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We...
Md. Abdul Hamid, Choong Seon Hong
COMCOM
2007
142views more  COMCOM 2007»
13 years 3 months ago
A survey of key management schemes in wireless sensor networks
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environm...
Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang...