Key management systems for sensor networks in the context of the Internet of Things

R Roman, C Alcaraz, J Lopez, N Sklavos - Computers & Electrical …, 2011 - Elsevier
If a wireless sensor network (WSN) is to be completely integrated into the Internet as part of
the Internet of Things (IoT), it is necessary to consider various security challenges, such as …

Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes

C Kuo, M Luk, R Negi, A Perrig - … of the 5th international conference on …, 2007 - dl.acm.org
Existing protocols for secure key establishment all rely on an unspecified mechanism for
initially deploying secrets to sensor nodes. However, no commercially viable and secure …

PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications

P Porambage, C Schmitt, P Kumar… - International …, 2014 - journals.sagepub.com
Wireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT)
applications should be integrated into the Internet. According to the distributed architecture …

[PDF][PDF] Constraints and approaches for distributed sensor network security (final)

DW Carman, PS Kruus, BJ Matt - DARPA project report,(cryptographic …, 2000 - cs.umbc.edu
Confidentiality, integrity, and authentication services are critical to preventing an adversary
from compromising the security of a distributed sensor network. Key management is likewise …

A key-management scheme for distributed sensor networks

L Eschenauer, VD Gligor - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes
with limited computation and communication capabilities. DSNs are dynamic in the sense …

[PDF][PDF] Wireless sensor networks and the internet of things: Do we need a complete integration?

C Alcaraz, P Najera, J Lopez… - 1st International Workshop …, 2010 - researchgate.net
Wireless sensor networks (WSN) behave as a digital skin, providing a virtual layer where the
information about the physical world can be accessed by any computational system. As a …

Survey on secure communication protocols for the Internet of Things

KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
Abstract The Internet of Things or “IoT” defines a highly interconnected network of
heterogeneous devices where all kinds of communications seem to be possible, even …

A survey on key management mechanisms for distributed wireless sensor networks

MA Simplício Jr, PSLM Barreto, CB Margi… - Computer …, 2010 - Elsevier
Wireless Sensor Networks (WSNs) have a vast field of applications, including deployment in
hostile environments. Thus, the adoption of security mechanisms is fundamental. However …

Hierarchical key management scheme with probabilistic security in a wireless sensor network (WSN)

A Albakri, L Harn, S Song - Security and communication …, 2019 - Wiley Online Library
Securing data transferred over a WSN is required to protect data from being compromised
by attackers. Sensors in the WSN must share keys that are utilized to protect data transmitted …

EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs

S Athmani, A Bilami, DE Boubiche - Future Generation Computer Systems, 2019 - Elsevier
Securing the network communication represents one of the most important challenges in
wireless sensor networks. The key distribution problem has been widely discussed in …