Journal articles on the topic 'Key management scheme in wireless sensor networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Key management scheme in wireless sensor networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhao, Nan Nan, and Jian Bo Yao. "Hybrid Key Management Scheme for WSN." Applied Mechanics and Materials 513-517 (February 2014): 424–30. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.424.
Full textLi, Chun Yuan, Xiao Tong Zhang, Yue Qi, Li Wen He, Hong Song Chen, and Xue Ying Zhang. "A New Key Management Scheme for Hierarchical Wireless Sensor Network." Applied Mechanics and Materials 385-386 (August 2013): 1622–25. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1622.
Full textZHANG, Zhi-ming. "Key management scheme of wireless sensor networks." Journal of Computer Applications 28, no. 5 (October 17, 2008): 1164–66. http://dx.doi.org/10.3724/sp.j.1087.2008.01164.
Full textDu, Dahai, Huagang Xiong, and Hailiang Wang. "An Efficient Key Management Scheme for Wireless Sensor Networks." International Journal of Distributed Sensor Networks 8, no. 1 (January 1, 2012): 406254. http://dx.doi.org/10.1155/2012/406254.
Full textChen, Chien-Ming, Xinying Zheng, and Tsu-Yang Wu. "A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/816549.
Full textCHEN, Ni, Jian-bo YAO, and Guang-jun WEN. "Improved key-management scheme for wireless sensor networks." Journal of Computer Applications 28, no. 10 (September 30, 2009): 2478–80. http://dx.doi.org/10.3724/sp.j.1087.2008.02478.
Full textTang Li. "Key Management Scheme for Hierarchical Wireless Sensor Networks." Journal of Convergence Information Technology 7, no. 16 (September 30, 2012): 280–88. http://dx.doi.org/10.4156/jcit.vol7.issue16.34.
Full textSharmila, R., and V. Vijayalakshmi. "Hybrid Key Management Scheme for Wireless Sensor Networks." International Journal of Security and Its Applications 9, no. 11 (November 30, 2015): 125–32. http://dx.doi.org/10.14257/ijsia.2015.9.11.13.
Full textBanihashemian, Saber, Abbas Ghaemi Bafghi, and Mohammad Hossien Yaghmaee Moghaddam. "Centralized Key Management Scheme in Wireless Sensor Networks." Wireless Personal Communications 60, no. 3 (April 27, 2011): 463–74. http://dx.doi.org/10.1007/s11277-011-0302-y.
Full textZhao, Qi Sheng, Xiao Ming Liu, and Hui Sheng Zhu. "An Improved Cluster Key Management Algorithm for Wireless Sensor Networks." Advanced Materials Research 998-999 (July 2014): 1092–95. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.1092.
Full textDiop, Abdoulaye, Yue Qi, and Qin Wang. "A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks." Advanced Materials Research 846-847 (November 2013): 864–68. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.864.
Full textSong, Yong Lei, and Shu Guo Cao. "A Lightweight of Cluster-Based Key Management Scheme for Wireless Sensor Networks." Applied Mechanics and Materials 341-342 (July 2013): 1133–37. http://dx.doi.org/10.4028/www.scientific.net/amm.341-342.1133.
Full textMamun, Quazi, Rafiqul Islam, and Mohammed Kaosar. "Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks." International Journal of Wireless Networks and Broadband Technologies 4, no. 1 (January 2015): 29–44. http://dx.doi.org/10.4018/ijwnbt.2015010103.
Full textQin, Danyang, Shuang Jia, Songxiang Yang, Erfu Wang, and Qun Ding. "A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/1547963.
Full textChen, Chin-Ling, Tzay-Farn Shih, Yu-Ting Tsai, and De-Kui Li. "A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/534657.
Full textLiu, Jung-Chun, Yi-Li Huang, Fang-Yie Leu, Feng-Ching Chiang, Chao-Tung Yang, and William Cheng-Chung Chu. "Square Key Matrix Management Scheme in Wireless Sensor Networks." Computing and Informatics 36, no. 1 (2017): 169–85. http://dx.doi.org/10.4149/cai_2017_1_169.
Full textSuganthi, N., and Sumathy Vembu. "Energy Efficient Key Management Scheme for Wireless Sensor Networks." International Journal of Computers Communications & Control 9, no. 1 (January 3, 2014): 71. http://dx.doi.org/10.15837/ijccc.2014.1.235.
Full textKADRI, Benamar, Mohammed FEHAM, and Abdellah MHAMMED. "Architecture Aware Key Management Scheme for Wireless Sensor Networks." International Journal of Information Technology and Computer Science 4, no. 12 (November 6, 2012): 50–59. http://dx.doi.org/10.5815/ijitcs.2012.12.05.
Full textA. Al-taha, Mohammed, and Ra'ad A. Muhajjar. "Symmetric Key Management Scheme for Hierarchical Wireless Sensor Networks." International Journal of Network Security & Its Applications 10, no. 3 (May 30, 2018): 17–24. http://dx.doi.org/10.5121/ijnsa.2018.10302.
Full textZhang, Qikun, Yuan Tan, Li Zhang, and Ruifang Wang. "A Combined Key Management Scheme in Wireless Sensor Networks." Sensor Letters 9, no. 4 (August 1, 2011): 1501–6. http://dx.doi.org/10.1166/sl.2011.1671.
Full textSharmila, R., and V. Vijayalakshmi. "Hybrid Key Management Scheme for Heterogeneous Wireless Sensor Networks." International Journal of Knowledge Engineering and Soft Data Paradigms 6, no. 2 (2019): 1. http://dx.doi.org/10.1504/ijkesdp.2019.10020639.
Full textSharmila, R., and V. Vijayalakshmi. "Hybrid key management scheme for heterogeneous wireless sensor networks." International Journal of Knowledge Engineering and Soft Data Paradigms 6, no. 2 (2019): 95. http://dx.doi.org/10.1504/ijkesdp.2019.102806.
Full textDai, Hangyang, and Hongbing Xu. "Triangle-based key management scheme for wireless sensor networks." Frontiers of Electrical and Electronic Engineering in China 4, no. 3 (April 20, 2009): 300–306. http://dx.doi.org/10.1007/s11460-009-0034-x.
Full textMessai, Mohamed-Lamine, Hamida Seba, and Makhlouf Aliouat. "A lightweight key management scheme for wireless sensor networks." Journal of Supercomputing 71, no. 12 (October 26, 2015): 4400–4422. http://dx.doi.org/10.1007/s11227-015-1534-5.
Full textZhang, Yuan, Yue Liu, and Zhong Tian Jia. "A Sensor Data Management Scheme for Wireless Sensor Networks." Key Engineering Materials 467-469 (February 2011): 709–12. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.709.
Full textKumar, Vipin, Navneet Malik, Gaurav Dhiman, and Tarun Kumar Lohani. "Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network." Wireless Communications and Mobile Computing 2021 (June 30, 2021): 1–11. http://dx.doi.org/10.1155/2021/5512879.
Full textAlbakri, Ashwag, Lein Harn, and Sejun Song. "Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)." Security and Communication Networks 2019 (July 14, 2019): 1–11. http://dx.doi.org/10.1155/2019/3950129.
Full textCui, Baojiang, Ziyue Wang, Bing Zhao, Xiaobing Liang, and Yuemin Ding. "Enhanced Key Management Protocols for Wireless Sensor Networks." Mobile Information Systems 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/627548.
Full textCheng, Wei, Yong Li, Yi Jiang, and Xipeng Yin. "A Movement-Efficient Deployment Scheme Based on Information Coverage for Mobile Sensor Networks." Journal of Electrical and Computer Engineering 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/986956.
Full textKumar, S., and N. Nagarajan. "Integrated Network Topological Control and Key Management for Securing Wireless Sensor Networks." International Journal of Ambient Computing and Intelligence 5, no. 4 (October 2013): 12–24. http://dx.doi.org/10.4018/ijaci.2013100102.
Full textZhang, Yu Quan. "A Novel Key Management Strategy for Heterogeneous Wireless Sensor Networks." Advanced Materials Research 818 (September 2013): 224–29. http://dx.doi.org/10.4028/www.scientific.net/amr.818.224.
Full textChen, Yuan, and Qing Ye. "Security Authentication Scheme Research for Wireless Sensor Networks." Applied Mechanics and Materials 687-691 (November 2014): 1802–5. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1802.
Full textM, Raju, Selvan M, and Lanitha B. "A Survey of Wireless Sensor Networks in Key Management Scheme." International Journal of Computer Applications 88, no. 11 (February 14, 2014): 12–15. http://dx.doi.org/10.5120/15395-3892.
Full textLalitha. "EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS." American Journal of Applied Sciences 11, no. 6 (June 1, 2014): 969–77. http://dx.doi.org/10.3844/ajassp.2014.969.977.
Full textChanda, Anubrata, Pampa Sadhukhan, and Nandini Mukherjee. "Key Management for Hierarchical Wireless Sensor Networks: A Robust Scheme." EAI Endorsed Transactions on Internet of Things 6, no. 23 (October 20, 2020): 166541. http://dx.doi.org/10.4108/eai.2-10-2020.166541.
Full textKadri, Benamar, Djilalli Moussaoui, Mohammed Feham, and Abdellah Mhammed. "An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks." Wireless Sensor Network 04, no. 06 (2012): 155–61. http://dx.doi.org/10.4236/wsn.2012.46022.
Full textAnuradha, K., L. Padma Sree, and Vijaya Saraswathi Redrowthu. "Dynamic group key management scheme for clustered wireless sensor networks." International Journal of Grid and Utility Computing 1, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijguc.2020.10029963.
Full textSaraswathi, R. Vijaya, L. Padma Sree, and K. Anuradha. "Dynamic group key management scheme for clustered wireless sensor networks." International Journal of Grid and Utility Computing 11, no. 6 (2020): 801. http://dx.doi.org/10.1504/ijguc.2020.110900.
Full textLalitha, T., and S. Jayaprabha. "Mobility Based Key Management Security Scheme for Wireless Sensor Networks." Wireless Personal Communications 87, no. 2 (July 8, 2015): 349–67. http://dx.doi.org/10.1007/s11277-015-2872-6.
Full textErfani, Seyed Hossein, Hamid H. S. Javadi, and Amir Masoud Rahmani. "A dynamic key management scheme for dynamic wireless sensor networks." Security and Communication Networks 8, no. 6 (June 10, 2014): 1040–49. http://dx.doi.org/10.1002/sec.1058.
Full textShen, Yong Luo, Jun Zhang, Di Wei Yang, and Lin Bo Luo. "A Bezier Curve Based Key Management Scheme for Hierarchical Wireless Sensor Networks." Applied Mechanics and Materials 263-266 (December 2012): 2979–85. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2979.
Full textShaik, Riaz, and Shaik Shakeel Ahamad. "Attack Resistant Agent Based Dynamic Key Management in Dynamic Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 195. http://dx.doi.org/10.14419/ijet.v7i2.32.15566.
Full textLi, Lan Ying, Chun Huan Yi, Jian Da Sun, and Tie Qiang Si. "An Improved Overlap-Key-Sharing Key Management Scheme for Wireless Sensor Networks." International Journal of Security and Its Applications 7, no. 5 (September 30, 2013): 387–96. http://dx.doi.org/10.14257/ijsia.2013.7.5.35.
Full textChen, Chin-Ling, Chih-Cheng Chen, and De-Kui Li. "Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/827546.
Full textZheng, Yan Hua. "A Research on Key Management in Wireless Sensor Networks." Applied Mechanics and Materials 303-306 (February 2013): 247–50. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.247.
Full textKim, Jiye, Jongho Moon, Jaewook Jung, and Dongho Won. "Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks." Journal of Sensors 2016 (2016): 1–17. http://dx.doi.org/10.1155/2016/4393721.
Full textZhang, Yu Quan, and Yan Wang. "A Secure Strategy for Location-Based Wireless Sensor Networks." Advanced Materials Research 631-632 (January 2013): 1409–15. http://dx.doi.org/10.4028/www.scientific.net/amr.631-632.1409.
Full textYUAN, Ting, Jian-Qing MA, Yi-Ping ZHONG, and Shi-Yong ZHANG. "Key Management Scheme Using Time-Based Deployment for Wireless Sensor Networks." Journal of Software 21, no. 3 (March 12, 2010): 516–27. http://dx.doi.org/10.3724/sp.j.1001.2010.03457.
Full textVerma, Seema, and Prachi. "A Cluster based Key Management Scheme for Underwater Wireless Sensor Networks." International Journal of Computer Network and Information Security 7, no. 9 (August 8, 2015): 54–63. http://dx.doi.org/10.5815/ijcnis.2015.09.07.
Full textChakavarika, Tafadzwa Tapuwa, Shashi Kant Gupta, and Brijesh Kumar Chaurasia. "Energy Efficient Key Distribution and Management Scheme in Wireless Sensor Networks." Wireless Personal Communications 97, no. 1 (May 29, 2017): 1059–70. http://dx.doi.org/10.1007/s11277-017-4551-2.
Full text