Academic literature on the topic 'Key management scheme in wireless sensor networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Key management scheme in wireless sensor networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Key management scheme in wireless sensor networks"
Zhao, Nan Nan, and Jian Bo Yao. "Hybrid Key Management Scheme for WSN." Applied Mechanics and Materials 513-517 (February 2014): 424–30. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.424.
Full textLi, Chun Yuan, Xiao Tong Zhang, Yue Qi, Li Wen He, Hong Song Chen, and Xue Ying Zhang. "A New Key Management Scheme for Hierarchical Wireless Sensor Network." Applied Mechanics and Materials 385-386 (August 2013): 1622–25. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1622.
Full textZHANG, Zhi-ming. "Key management scheme of wireless sensor networks." Journal of Computer Applications 28, no. 5 (October 17, 2008): 1164–66. http://dx.doi.org/10.3724/sp.j.1087.2008.01164.
Full textDu, Dahai, Huagang Xiong, and Hailiang Wang. "An Efficient Key Management Scheme for Wireless Sensor Networks." International Journal of Distributed Sensor Networks 8, no. 1 (January 1, 2012): 406254. http://dx.doi.org/10.1155/2012/406254.
Full textChen, Chien-Ming, Xinying Zheng, and Tsu-Yang Wu. "A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/816549.
Full textCHEN, Ni, Jian-bo YAO, and Guang-jun WEN. "Improved key-management scheme for wireless sensor networks." Journal of Computer Applications 28, no. 10 (September 30, 2009): 2478–80. http://dx.doi.org/10.3724/sp.j.1087.2008.02478.
Full textTang Li. "Key Management Scheme for Hierarchical Wireless Sensor Networks." Journal of Convergence Information Technology 7, no. 16 (September 30, 2012): 280–88. http://dx.doi.org/10.4156/jcit.vol7.issue16.34.
Full textSharmila, R., and V. Vijayalakshmi. "Hybrid Key Management Scheme for Wireless Sensor Networks." International Journal of Security and Its Applications 9, no. 11 (November 30, 2015): 125–32. http://dx.doi.org/10.14257/ijsia.2015.9.11.13.
Full textBanihashemian, Saber, Abbas Ghaemi Bafghi, and Mohammad Hossien Yaghmaee Moghaddam. "Centralized Key Management Scheme in Wireless Sensor Networks." Wireless Personal Communications 60, no. 3 (April 27, 2011): 463–74. http://dx.doi.org/10.1007/s11277-011-0302-y.
Full textZhao, Qi Sheng, Xiao Ming Liu, and Hui Sheng Zhu. "An Improved Cluster Key Management Algorithm for Wireless Sensor Networks." Advanced Materials Research 998-999 (July 2014): 1092–95. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.1092.
Full textDissertations / Theses on the topic "Key management scheme in wireless sensor networks"
Zia, Tanveer. "A Security Framework for Wireless Sensor Networks." University of Sydney, 2008. http://hdl.handle.net/2123/2258.
Full textSensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes etc. However, wireless sensor networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. Though there has been some development in the field of sensor network security, the solutions presented thus far address only some of security problems faced. This research presents a security framework WSNSF (Wireless Sensor Networks Security Framework) to provide a comprehensive security solution against the known attacks in sensor networks. The proposed framework consists of four interacting components: a secure triple-key (STKS) scheme, secure routing algorithms (SRAs), a secure localization technique (SLT) and a malicious node detection mechanism. Singly, each of these components can achieve certain level of security. However, when deployed as a framework, a high degree of security is achievable. WSNSF takes into consideration the communication and computation limitations of sensor networks. While there is always a trade off between security and performance, experimental results prove that the proposed framework can achieve high degree of security with negligible overheads.
JAIN, ABHISHEK. "NON-UNIFORM PROBABILISTIC KEY MANAGEMENT SCHEMES FOR SECURE DATA ACQUISITION IN WIRELESS SENSOR NETWORKS." University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1153275740.
Full textPrajapati, Kamini B. "An efficient key update scheme for wireless sensor networks." Online access for everyone, 2005. http://www.dissertations.wsu.edu/thesis/Fall2005/k%5Fprajapati%5F121405.pdf.
Full textMehallegue, N. "Efficient Key Management for Wireless Sensor Networks." Thesis, Queen's University Belfast, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.517553.
Full textAlmalkawi, Islam. "Wireless multimedia sensor networks, security and key management." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129557.
Full textChorzempa, Michael William. "Key Management for Wireless Sensor Networks in Hostile Environments." Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/32105.
Full textMaster of Science
Ottallah, Noor. "Implementation of Secure Key Management Techniques in Wireless Sensor Networks." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/703.
Full textNanduri, Krishna Teja. "Energy Efficient Key Management in Wireless Sensor Networks using Multivariate Polynomials." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1511858753134053.
Full textWen, Wen. "Energy Efficient Secure Key Management Schemes for WSNs and IoT." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35257.
Full textPorambage, P. (Pawani). "Lightweight authentication and key management of wireless sensor networks for Internet of things." Doctoral thesis, Oulun yliopisto, 2018. http://urn.fi/urn:isbn:9789526219950.
Full textTiivistelmä Esineiden internet (IoT) on viime aikoina yleistynyt konsepti älykkäiden objektien (smart objects) liittämiseksi internetiin käyttämällä erilaisia verkko- ja kommunikaatioteknologioita. Olennaisimpia esineiden internetin pohjalla toimivia teknologioita ovat langattomat sensoriverkot (WSN), jotka ovat esineiden internetin perusrakennuspalikoita. Esineiden internetiin kytketyt langattomat sensoriverkot mahdollistavat laajan joukon erilaisia sovelluksia, kuten älykodit, etäterveydenhuollon, älykkäät kaupungit sekä älykkäät teollisuuden sovellukset. Langattomien sensoriverkkojen ja esineiden internetin yhdistäminen tuo mukanaan myös tietoturvaan liittyviä haasteita, sillä laskentateholtaan yleensä heikot anturit ja toimilaitteet eivät kykene kovin vaativiin tietoturvaoperaatioihin, joihin lukeutuvat mm. tietoturva-avaimen muodostus ja käyttäjäntunnistus. Tässä väitöskirjassa pyritään vastaamaan haasteeseen käyttämällä kevyitä avaimenmuodostus- ja käyttäjäntunnistusratkaisuja esineiden internetiin kytketyissä resurssirajoitetuissa sensoriverkoissa. Väitöstutkimuksessa keskitytään aluksi implisiittisten sertifikaattien käyttöön tietoturvallisten end-to-end-kommunikaatiokanavien alustamisessa resurssirajoitettujen sensori- ja muiden IoT-laitteiden välillä. Implisiittisiä sertifikaatteja käytetään käyttäjäntunnistuksessa sekä avaimenmuodostuksessa. Kehitettyjen ratkaisujen soveltuvuus tarkoitukseen osoitetaan suorituskykymittauksilla sekä vertaamalla niiden tietoturvaomi- naisuuksia. Seuraavaksi väitöskirjassa esitellään kaksi kevyttä ryhmäavaimenmuodostus- protokollaa tietoturvalliseen ryhmäkommunikaatioon resurssirajoitettujen IoT-laitteiden välillä. Lopuksi väitöskirjassa tarkastellaan lupaavia lähestymistapoja olemassa olevien tietoturvaprotokollien räätäläintiin IoT-laitteiden ja -verkkojen ominaisuuksille sopiviksi. Erityistä huomiota kiinnitetään Host Identity -protokollan (HIP) eri versioiden käyttöön dynaamisten ja tietoturvallisten end-to-end-yhteyksien luomiseen toisilleen ennestään tuntemattomien erityyppisten IoT-laitteiden välillä, joiden laitteistoresurssiprofiilit voivat olla hyvin erilaiset. Väitöskirjan keskeinen tulos on väitöskirjatyössä kehitetty Colla- borative HIP (CHIP) -protokolla, joka on resurssitehokas avaimenmuodostusteknologia resurssirajoitetuille IoT-laitteille. Kehitetyn teknologian soveltuvuutta tarkoitukseensa demonstroidaan prototyyppitoteutuksella tehtyjen suorituskykymittausten avulla
Book chapters on the topic "Key management scheme in wireless sensor networks"
Wang, Yongjian, and Jing Zhao. "Key Management Scheme for Wireless Sensor Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 272–83. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-90802-1_24.
Full textKim, Yong Ho, Mu Hyun Kim, Dong Hoon Lee, and Changwook Kim. "A Key Management Scheme for Commodity Sensor Networks." In Ad-Hoc, Mobile, and Wireless Networks, 113–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561354_11.
Full textChen, Shuai, Xiaowei Liao, Renyi Shu, Xiaobo Shen, Xiaojun Xu, and Xiaodong Zheng. "Dynamic Key Management Scheme in Wireless Sensor Networks." In Communications in Computer and Information Science, 381–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25002-6_54.
Full textYang, Qing, QiaoLiang Li, Xiaoming Wang, Naixue Xiong, and Yi Pan. "A Random Key Management Scheme for Wireless Sensor Networks." In Wireless Algorithms, Systems, and Applications, 480–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88582-5_45.
Full textKim, Yong Ho, Hwaseong Lee, Dong Hoon Lee, and Jongin Lim. "A Key Management Scheme for Large Scale Distributed Sensor Networks." In Personal Wireless Communications, 437–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11872153_38.
Full textLiu, Jung-Chun, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang, and William Cheng-Chung Chu. "A Multiple-Key Management Scheme in Wireless Sensor Networks." In Security Engineering and Intelligence Informatics, 337–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40588-4_23.
Full textPatil, Shantala Devi, B. P. Vijayakumar, and Kiran Kumari Patil. "Fractal PKC-Based Key Management Scheme for Wireless Sensor Networks." In Advances in Intelligent Systems and Computing, 121–28. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3779-5_15.
Full textKausar, Firdous, Ashraf Masood, and Sajid Hussain. "An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks." In Lecture Notes in Electrical Engineering, 85–98. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-74938-9_7.
Full textZhou, Jun, and Mingxing He. "An Improved Distributed Key Management Scheme in Wireless Sensor Networks." In Information Security Applications, 305–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6_23.
Full textAn, F., X. Cheng, J. M. Rivera, J. Li, and Z. Cheng. "PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks." In Networking and Mobile Computing, 992–1001. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_104.
Full textConference papers on the topic "Key management scheme in wireless sensor networks"
Pei, Qingqi, Lei Wang, Hao Yin, Liaojun Pang, and Hong Tang. "Layer Key Management Scheme on Wireless Sensor Networks." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.309.
Full textZhao, Qisheng, and Xiaoming Liu. "Cluster Key Management Scheme for Wireless Sensor Networks." In 2nd International Conference on Teaching and Computational Science. Paris, France: Atlantis Press, 2014. http://dx.doi.org/10.2991/ictcs-14.2014.23.
Full textZhao, Shen, and Jun Zheng. "Efficient Key Management Scheme in Wireless Sensor Networks." In 2015 2nd International Conference on Electrical, Computer Engineering and Electronics. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/icecee-15.2015.213.
Full textLu, Yung-Feng, Chin-Fu Kuo, and Ai-Chun Pang. "A half-key key management scheme for wireless sensor networks." In the 2011 ACM Symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2103380.2103433.
Full textA. Al-taha, Mohammed, and Ra'ad A. Muhajjar. "Lightweight Key Management Scheme for Hierarchical Wireless Sensor Networks." In 7th International Conference on Computer Science, Engineering & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71111.
Full textMa, Xiaofei, and Zhuoya Dong. "A Novel Key Management Scheme for Wireless Sensor Networks." In 2012 Sixth International Conference on Internet Computing for Science and Engineering (ICICSE). IEEE, 2012. http://dx.doi.org/10.1109/icicse.2012.50.
Full textTufail, Ali, Amna Ali, and Ki-Hyung Kim. "A Reliable key management scheme for Wireless Sensor Networks." In 2010 9th International Conference on the Optical Internet (COIN). IEEE, 2010. http://dx.doi.org/10.1109/coin.2010.5546672.
Full textWuu, Lih-Chyau, Chi-Hsiang Hung, and Chia-Ming Chang. "Quorum-based key management scheme in wireless sensor networks." In the 6th International Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2184751.2184770.
Full textLi, Guorui, Ying Wang, and Jingsha He. "Efficient Group Key Management Scheme in Wireless Sensor Networks." In 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI). IEEE, 2010. http://dx.doi.org/10.1109/iitsi.2010.131.
Full textZhang, Taogai, and Hongshan Qu. "A Lightweight Key Management Scheme for Wireless Sensor Networks." In 2010 Second International Workshop on Education Technology and Computer Science. IEEE, 2010. http://dx.doi.org/10.1109/etcs.2010.395.
Full textReports on the topic "Key management scheme in wireless sensor networks"
Fekri, Faramarz, E. Ayday, and R. Subramanian. Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada533169.
Full text