Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
ICWMC '07 Proceedings of the Third International Conference on Wireless and Mobile Communications
Key establishment between heterogenous nodes in wireless sensor and actor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
ZigBee security using identity-based cryptography
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Secure information sharing between heterogeneous embedded devices
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Experimental performance evaluation of POBICOS middleware for wireless sensor networks
ISRN Communications and Networking
Hi-index | 0.00 |
Wirelessly networked sensors and actuators are a cornerstone of systems that try to introduce smartness in a wide range of outdoor and indoor environments. The robust and secure operation of such systems is of central importance and will definitely play a key role in terms of their adoption by organizations and individuals. However, the commonly applied security mechanisms based on current standards are either resource consuming, inconvenient to use, or both. In this paper, a generic, lightweight and user-friendly approach to implement secure network management and confidentiality in a Distributed Sensor Networks (DSNs) is proposed.