Sciweavers

287 search results - page 3 / 58
» On Active Attacks on Sensor Network Key Distribution Schemes
Sort
View
SASN
2005
ACM
13 years 11 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
OTM
2007
Springer
13 years 12 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
CSE
2009
IEEE
14 years 16 days ago
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks
We present a deterministic Key Predistribution scheme in Wireless Sensor Networks (WSN) using combinatorial designs. The design finds application where a large number sensor node...
Sushmita Ruj, Jennifer Seberry, Bimal K. Roy
INFOCOM
2006
IEEE
13 years 11 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya