Opportunistic user selection with adaptive jamming for secure communication in heterogeneous networks

Author(s):  
Inkyu Bang ◽  
Su Min Kim ◽  
Dan Keun Sung
2012 ◽  
Vol 482-484 ◽  
pp. 252-255
Author(s):  
Xi Yuan Ma ◽  
Shu Mei Fan ◽  
Myong Soon Park

Wireless Sensor Networks (WSNs) are usually subjected to numerous threats and vulnerable to various attacks. Generally, the key management is considered to be the prerequisite for secure communication in WSNs. In this paper, we present a Localization-based Clustered Key Management (LCKM) which can efficiently enhance the network security and survivability for the clustered heterogeneous networks. LCKM utilizes the seeds to rekey and then localize the key materials, which protects the network from the compromised nodes by reducing the probability of the common key. The security analysis proves that LCKM can prevent more attacks than other protocols.


2016 ◽  
Vol 64 (8) ◽  
pp. 3492-3506 ◽  
Author(s):  
Hao Deng ◽  
Hui-Ming Wang ◽  
Jinhong Yuan ◽  
Wenjie Wang ◽  
Qinye Yin

Author(s):  
B. Adithya ◽  
B. Sathish Babu

Ubiquitous computing has been studied extensively as a post desktop model. Secure communication among various heterogeneous networks is been a challenge in service environment with location dynamism of the nodes. In this paper the authors proposed model for trust worthy communications among devices of various networks in a ubiquitous environment with varied service needs, security needs and computational-storage capacities. The model uses a novel approach for computing trust - adaptive to capacity and services.


Sign in / Sign up

Export Citation Format

Share Document