Welcome![Sign In][Sign Up]
Location:
Search - key management with wsn

Search list

[Technology Managementwsn

Description: 一份很好的关于无线传感器网络密钥算法的资料-A very good key algorithm on wireless sensor network data
Platform: | Size: 2791424 | Author: dddd | Hits:

[OS programPresentaion_Pranith_Ramamurthy_E951.ppt.tar

Description: Presentation various key ditribution mechanisms in WSN-Presentation on various key ditribution mechanisms in WSN
Platform: | Size: 17408 | Author: pranith | Hits:

[Industry researchACR-WES-v5--copy

Description: Wireless Embedded Systems (WEBs) has attracted significant interest in recent years, for instance, Wireless Sensor Networks (WSN), have recently been in the limelight for many domains. The characteristics of WEBs have imposed various restrictions on their system designs. Since embedded systems usually are developed by low-cost hardware, one major challenge in the development of many WEBs applications is to provide high-security features with limited resources. In this paper, we propose a novel key establishment scheme, named half-key scheme that based on the well-known random key pre-distribution scheme and DDHV-D deployment knowledge to provide resource-efficient key management in WEBs with reduced memory space requirements and better security enforcement. The capability of the proposed approach is evaluated by an analytical model and a series of experiments.
Platform: | Size: 162816 | Author: ufon | Hits:

[Software EngineeringRehana_final

Description: Wireless Sensor Networks (WSN) is an emerging technology and day by day it is attracting the attention of researchers with its challenging characteristics and diversified application domain. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to fit the security of WSN into that constrained environment. However, security is crucial to the success of applying WSN. So, familiarity with the security aspects of WSN is essential before designing WSN system. This paper studies the security problems of WSN based on its resource restricted design and deployment characteristics and the security requirements for designing a secure WSN. Also, this study documents the well known attacks at the different layers of WSN and some counter measures against those attacks. Finally, this paper discusses on some defensive measures of WSN giving focus on the key management, link layer and routing security
Platform: | Size: 134144 | Author: fetemeh | Hits:

CodeBus www.codebus.net