We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
Energy constraints in a wireless sensor network are crucial issues criticallyaffectingthe network lifetime and connectivity. To realize true energysavingin a wireless environment,t...
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
One challenging issue in sensor networks is to determine where a given sensor node is physically located. This problem is especially crucial for very small sensor nodes. This pape...