On the key revocation schemes in wireless sensor networks
Among all security issues, key management is the most attractive mechanism to ensure security of applications and network services in wireless sensor networks. Key management includes two important aspects namely: Key distribution, which constitutes the task of distributing secret keys to nodes in t...
| Main Authors: | Mall, Dieynaba, Konaté, Karim, Pathan, Al-Sakib Khan |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/31626/ http://irep.iium.edu.my/31626/1/Dieyana_Sakib_GreenCom13.pdf |
Similar Items
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
by: Mall, Dieynaba, et al.
Published: (2015)
by: Mall, Dieynaba, et al.
Published: (2015)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Securing wireless sensor networks with an efficient B+ tree-based key management scheme
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
An enhanced tree-based key management scheme for secure communication in wireless sensor network
by: Rasul, Khadija, et al.
Published: (2010)
by: Rasul, Khadija, et al.
Published: (2010)
A key management scheme with encoding and improved security for wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Security management in wireless sensor networks with a public key based scheme
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
A resource-optimal key pre-distribution scheme with improved security for wireless sensor networks
by: Dai, Tran Thanh, et al.
Published: (2006)
by: Dai, Tran Thanh, et al.
Published: (2006)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks
by: Guerroumi, Mohamed, et al.
Published: (2013)
by: Guerroumi, Mohamed, et al.
Published: (2013)
An efficient LU decomposition-based key pre-distribution scheme for ensuring security in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
On the medium access control protocols suitable for wireless sensor networks – a survey
by: Guerroumi, Mohamed, et al.
Published: (2014)
by: Guerroumi, Mohamed, et al.
Published: (2014)
On the vital areas of intrusion detection systems in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2012)
by: Abduvaliyev, Abror, et al.
Published: (2012)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Editorial: Wireless sensor networks based on environmental energy harvesting
by: Han, Guangjie, et al.
Published: (2013)
by: Han, Guangjie, et al.
Published: (2013)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Optimal cooperative MIMO scheme in wireless sensor networks
by: Ahmad, Mohd Riduan, et al.
Published: (2010)
by: Ahmad, Mohd Riduan, et al.
Published: (2010)
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Denial of service in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
On the issues and challenges of Fiber-Wireless (Fi-Wi) networks
by: Win, Harry Tin, et al.
Published: (2013)
by: Win, Harry Tin, et al.
Published: (2013)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Securing U-Healthcare sensor networks using public key based scheme
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Security wireless sensor networks: prospects, challenges, and future
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
S-PkSec: an asymmetric key based security management scheme for sensor network operation
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Tackling Intruders in Wireless Mesh Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Energy-efficient secure routing in heavily deployed wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Optimizing wireless sensor networks: A survey of clustering strategies and algorithms
by: Hamim, Sakib Iqram, et al.
Published: (2024)
by: Hamim, Sakib Iqram, et al.
Published: (2024)
Advances in cognitive radio sensor networks
by: Kim, Hyung Seok, et al.
Published: (2014)
by: Kim, Hyung Seok, et al.
Published: (2014)
Feasibility of PKC in resource-constrained wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Similar Items
-
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
by: Mall, Dieynaba, et al.
Published: (2015) -
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014) -
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013) -
Securing wireless sensor networks with an efficient B+ tree-based key management scheme
by: Rasul, Khadija, et al.
Published: (2010) -
An enhanced tree-based key management scheme for secure communication in wireless sensor network
by: Rasul, Khadija, et al.
Published: (2010)