Search Results

There are 12830 results for: content related to: An efficient random key distribution scheme for large-scale distributed sensor networks

  1. Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 109–121, Dai Thanh Tran and Johnson I. Agbinya

    Version of Record online : 1 APR 2009, DOI: 10.1002/sec.106

  2. Trust Bootstrapping in Wireless Sensor Networks

    Wireless Internet and Mobile Computing: Interoperability and Performance

    Yu-Kwong Ricky Kwok, Vincent K. N. Lau, Pages: 615–643, 2007

    Published Online : 22 JAN 2007, DOI: 10.1002/9780470167960.ch26

  3. HIKES: Hierarchical key establishment scheme for wireless sensor networks

    International Journal of Communication Systems

    Volume 27, Issue 10, October 2014, Pages: 1825–1856, J. Ibriq and I. Mahgoub

    Version of Record online : 8 NOV 2012, DOI: 10.1002/dac.2438

  4. A robust user authentication scheme with self-certificates for wireless sensor networks

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 815–824, Huei-Ru Tseng, Rong-Hong Jan and Wuu Yang

    Version of Record online : 9 JUN 2010, DOI: 10.1002/sec.212

  5. A scalable key pre-distribution mechanism for large-scale wireless sensor networks

    Concurrency and Computation: Practice and Experience

    Volume 21, Issue 10, July 2009, Pages: 1373–1387, An-Ni Shen, Song Guo, Hung Yu Chien and Minyi Guo

    Version of Record online : 16 APR 2009, DOI: 10.1002/cpe.1429

  6. A survey of key distribution in wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2495–2508, Chi-Yuan Chen and Han-Chieh Chao

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.354

  7. An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1013–1026, Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Jinfang Jiang, Lei Shu and Guangjie Han

    Version of Record online : 13 DEC 2010, DOI: 10.1002/sec.277

  8. A dynamic key management scheme for dynamic wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1040–1049, Seyed Hossein Erfani, Hamid H.S. Javadi and Amir Masoud Rahmani

    Version of Record online : 10 JUN 2014, DOI: 10.1002/sec.1058

  9. Security in wireless sensor networks

    Wireless Communications and Mobile Computing

    Volume 8, Issue 1, January 2008, Pages: 1–24, Venkata C. Giruka, Mukesh Singhal, James Royalty and Srilekha Varanasi

    Version of Record online : 12 SEP 2006, DOI: 10.1002/wcm.422

  10. Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 125–144, Hani Alzaid, Ernest Foo, Juan González Nieto and Ejaz Ahmed

    Version of Record online : 8 FEB 2011, DOI: 10.1002/sec.286

  11. Dynamic combinatorial key management scheme for sensor networks

    Wireless Communications and Mobile Computing

    Volume 6, Issue 7, November 2006, Pages: 1017–1035, Mohamed Moharrum, Mohamed Eltoweissy and Ravi Mukkamala

    Version of Record online : 24 OCT 2006, DOI: 10.1002/wcm.435

  12. Security Issues and Countermeasures in Wireless Sensor Networks

    Algorithms and Protocols for Wireless Sensor Networks

    Tanveer Zia, Albert Y. Zomaya, Pages: 479–502, 2008

    Published Online : 26 MAR 2008, DOI: 10.1002/9780470396360.ch16

  13. Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks

    Security and Communication Networks

    Volume 4, Issue 1, January 2011, Pages: 11–22, Yanjiang Yang, Jianying Zhou, Robert H. Deng and Feng Bao

    Version of Record online : 11 JAN 2010, DOI: 10.1002/sec.179

  14. A new approach for random key pre-distribution in large-scale wireless sensor networks

    Wireless Communications and Mobile Computing

    Volume 6, Issue 3, May 2006, Pages: 307–318, Kui Ren, Kai Zeng and Wenjing Lou

    Version of Record online : 2 MAY 2006, DOI: 10.1002/wcm.397

  15. You have full text access to this OnlineOpen article
    Self-healing wireless sensor networks

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 10, July 2015, Pages: 2547–2568, Atsuko Miyaji and Kazumasa Omote

    Version of Record online : 8 APR 2015, DOI: 10.1002/cpe.3434

  16. Deterministic K-means secure coverage clustering with periodic authentication for wireless sensor networks

    International Journal of Communication Systems

    M. Bala Krishna and M. N. Doja

    Version of Record online : 24 SEP 2015, DOI: 10.1002/dac.3024

  17. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  18. A key management technique based on elliptic curves for static wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3726–3738, Payingat Jilna and Deepthi P. Pattathil

    Version of Record online : 30 JUN 2015, DOI: 10.1002/sec.1295

  19. Sensor network security for pervasive e-health

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1257–1273, Oscar Garcia-Morchon, Thomas Falck and Klaus Wehrle

    Version of Record online : 13 DEC 2010, DOI: 10.1002/sec.247

  20. A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor

    International Journal of Communication Systems

    Ashok Kumar Das

    Version of Record online : 29 JAN 2015, DOI: 10.1002/dac.2933