scholar.google.com › citations
Abstract------Wireless sensor networks emerges as most challenging area of research now days. In WSN sensors generally collects and disseminate important ...
The communication of a wireless sensor network can be eaves dropped quite easily due to its properties, thereby requiring a security mechanism. Adding a key ...
This paper describes a probabilistic model and two protocols to establish a secure pair-wise communication channel between any pair of sensors in the WSN.
Missing: Broadcast | Show results with:Broadcast
Abstract. Efficient key distribution is the basis for providing secure communication, a necessary requirement for many emerging sensor network applications.
I. INTRODUCTION. A sensor is a device that translates parameters or events in the physical world into signals that can be measured and analyzed.
Random Key Predistribution refers to a method in computer science where keys are preloaded in a random manner on sensor nodes, with the aim of establishing ...
Sep 17, 2010 · In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash ...
People also ask
How do you secure a sensor network?
What are the approaches for securing WSN?
What are the security issues with WSN?
What are the different security requirements in a generic wireless sensor network?
Sep 1, 2020 · This paper presents a scalable broadcast authentication scheme named DH-μTESLA, which is an extension and improvement of μTESLA and Multilevel μTESLA.
Jan 1, 2013 · When appropriate protocols and ciphers are used, a network with unique random keys for each end-to-end session protects the confidentiality, ...
Missing: Broadcast | Show results with:Broadcast
Each sensor node receives a random subset of keys from the key pool before deployment. Any two nodes able to find one com- mon key within their respective ...