A security enhanced authentication and key distribution protocol for wireless networks

Author(s):  
Chao Lv ◽  
Maode Ma ◽  
Hui Li ◽  
Jianfeng Ma
2013 ◽  
Vol 2 (2) ◽  
pp. 183-186 ◽  
Author(s):  
Marco Baldi ◽  
Marco Bianchi ◽  
Nicola Maturo ◽  
Franco Chiaraluce

2012 ◽  
Vol 55 (4) ◽  
pp. 438-438
Author(s):  
B. Tian ◽  
S. Han ◽  
S. Parvin ◽  
J. Hu ◽  
S. Das

2018 ◽  
Vol 24 (8) ◽  
pp. 6013-6016
Author(s):  
K. S Umadevi ◽  
Arijit Ghosh ◽  
Anurag Menon ◽  
Mandar Nanaware

Key distribution is an inevitable part of the wireless networks and is important for node identification and authentication and also is important for maintaining data confidentiality and integrity of the communication system. In this paper, the numerous key distribution algorithms already implemented in the wireless sensor networks have been studied along with their architecture and their efficiency based on the various hardware constraints of WSN and the various attacks affecting the wireless networks like that of the DOS and node duplication attacks. On the basis of the study, a new key distribution algorithm have been suggested to overcome the drawbacks of the other methods and has focused on the same in ad hoc networks so that it can be implemented in critical situations requiring random deployment of sensors in a dynamic environment. The authors have suggested a symmetric key algorithm based on relative counters and timers which will be used to create exclusive pair keys from a master key provided by a trusted base station.


2011 ◽  
Vol 5 (4) ◽  
pp. 343-352
Author(s):  
Chao Lv ◽  
Maode Ma ◽  
Hui Li ◽  
Jianfeng Ma ◽  
Ben Niu

Sign in / Sign up

Export Citation Format

Share Document