Cesare Celozzi

Learn More
Wireless sensor networks have been applied in various contexts where hardware and network data are exposed to security threats, such as tampering or eavesdropping. The majority of the security approaches adopted in this context are based on symmetric encryption, which requires keys shared among the nodes. Many key management schemes, like the transitory(More)
In recent years, wireless sensor networks have been adopted in various areas of daily life, and this exposes the network data and hardware to a number of security threats. Many key management schemes have been proposed to secure the communications among nodes, for instance the popular LEAP+ protocol. This paper proposes an enhanced variant of the LEAP+(More)
  • 1