Cost effective hash chain based key pre-distribution scheme for wireless sensor network

CN Yang, TJ Lin, SY Wu, SS Lin… - 2018 IEEE 18th …, 2018 - ieeexplore.ieee.org
In wireless sensor network (WSN), a secure link in the key pre-distribution (KP) scheme may
be compromised when sensor nodes are captured. Accordingly, the KP q-composite …

Two-dimensional diagonal layer hash chain based key pre-distribution scheme

CN Yang, CL Kao, CJ Wang - Journal of Information Security and …, 2021 - Elsevier
Recently, Ehdaie et al. proposed a two-dimensional hash chain based key pre-distribution
(2DHC-KPD) scheme that can enhance resiliency against node-capture attack when …

On the analysis of k-Secure t-conference key distribution scheme

CN Yang, JM Li, YS Chou - Proceedings of the 2017 7th International …, 2017 - dl.acm.org
The k-Secure t-Conference key distribution scheme (kStC-KDS) provides dynamic
conferences in wireless sensor networks, which any group of t sensor nodes can derive a …

Key management in tree shaped hierarchies

L Lopriore - Information Security Journal: A Global Perspective, 2018 - Taylor & Francis
We refer to an access control system based on subjects and objects. Subjects are active
entities, eg processes, while objects are passive entities, eg messages exchanged between …

Key management in wireless sensor networks

L Lopriore - Information Security Journal: A Global Perspective, 2019 - Taylor & Francis
We refer to a distributed architecture consisting of sensor nodes connected by wireless links
and organized in a tree-shaped hierarchy. We present a paradigm for the management of …

[HTML][HTML] Protected pointers to specify access privileges in distributed systems

L Lopriore, A Santone - Journal of Parallel and Distributed Computing, 2019 - Elsevier
With reference to a distributed environment consisting of nodes connected in an arbitrary
network topology, we propose the organization of a protection system in which a set of …

Representation and management of multiple keys

L Lopriore - Computers & Electrical Engineering, 2018 - Elsevier
We refer to a key-based protection environment featuring active subjects and protected
objects. A subject that possesses a key for a given object is allowed to access this object to …

[PDF][PDF] Design and implementation of protection mechanisms for wireless sensor networks

M Signorini, G Dini, L Lopriore - 2015 - core.ac.uk
This work falls within the context of security in wireless sensor networks. The aim of this work
is to realize applications based on security mechanisms already present in the literature …