Key management systems for sensor networks in the context of the Internet of Things
If a wireless sensor network (WSN) is to be completely integrated into the Internet as part of
the Internet of Things (IoT), it is necessary to consider various security challenges, such as …
the Internet of Things (IoT), it is necessary to consider various security challenges, such as …
Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
Existing protocols for secure key establishment all rely on an unspecified mechanism for
initially deploying secrets to sensor nodes. However, no commercially viable and secure …
initially deploying secrets to sensor nodes. However, no commercially viable and secure …
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
Wireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT)
applications should be integrated into the Internet. According to the distributed architecture …
applications should be integrated into the Internet. According to the distributed architecture …
[PDF][PDF] Constraints and approaches for distributed sensor network security (final)
DW Carman, PS Kruus, BJ Matt - DARPA project report,(cryptographic …, 2000 - cs.umbc.edu
Confidentiality, integrity, and authentication services are critical to preventing an adversary
from compromising the security of a distributed sensor network. Key management is likewise …
from compromising the security of a distributed sensor network. Key management is likewise …
A key-management scheme for distributed sensor networks
L Eschenauer, VD Gligor - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes
with limited computation and communication capabilities. DSNs are dynamic in the sense …
with limited computation and communication capabilities. DSNs are dynamic in the sense …
[PDF][PDF] Wireless sensor networks and the internet of things: Do we need a complete integration?
Wireless sensor networks (WSN) behave as a digital skin, providing a virtual layer where the
information about the physical world can be accessed by any computational system. As a …
information about the physical world can be accessed by any computational system. As a …
Survey on secure communication protocols for the Internet of Things
KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
Abstract The Internet of Things or “IoT” defines a highly interconnected network of
heterogeneous devices where all kinds of communications seem to be possible, even …
heterogeneous devices where all kinds of communications seem to be possible, even …
A survey on key management mechanisms for distributed wireless sensor networks
Wireless Sensor Networks (WSNs) have a vast field of applications, including deployment in
hostile environments. Thus, the adoption of security mechanisms is fundamental. However …
hostile environments. Thus, the adoption of security mechanisms is fundamental. However …
Hierarchical key management scheme with probabilistic security in a wireless sensor network (WSN)
Securing data transferred over a WSN is required to protect data from being compromised
by attackers. Sensors in the WSN must share keys that are utilized to protect data transmitted …
by attackers. Sensors in the WSN must share keys that are utilized to protect data transmitted …
EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs
Securing the network communication represents one of the most important challenges in
wireless sensor networks. The key distribution problem has been widely discussed in …
wireless sensor networks. The key distribution problem has been widely discussed in …