• Publications
  • Influence
EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
TLDR
We develop a cluster based technique for key management in wireless sensor network. Expand
  • 5
  • 3
Energy Efficient Cluster Based key Management Technique for Wireless Sensor Networks
Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him toExpand
  • 6
  • 1
Cluster based Efficient Key Management & Authentication Technique for Wireless Sensor Networks
TLDR
We propose a cluster based key management technique for authentication in wireless sensor networks that recovers compromised nodes in the secured manner. Expand
  • 3
Energy Efficient Cluster based Key Management & Authentication Technique for Wireless Sensor Networks
In wireless sensor networks, the security attacks a re due to the compromise of the large part of the n etwork which can cause node damage or disturbance in the data flow. At the time of re-keyingExpand
  • 2
  • PDF
Security in Wireless Sensor Networks: Key Management Module in EECBKM
  • T. Lalitha, A. Devi
  • Computer Science
  • World Congress on Computing and Communication…
  • 3 April 2014
TLDR
Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Expand
  • 3
Mobility Based Key Management Security Scheme for Wireless Sensor Networks
TLDR
In wireless sensor networks (WSNs) handling mobility of nodes in key management is a challenging task. Expand
  • 2
Challenges and Surveys in Key Management and Authentication Scheme for Wireless Sensor Networks
Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him toExpand
  • 3
  • PDF
A Study on Existing Protocols and Energy-Balanced Routing Protocol for Data Gathering in Wireless Sensor Networks
TLDR
Energy is an extremely critical resource for battery-powered wireless sensor networks (WSN) thus making energy-efficient protocol design a key challenging problem. Expand
  • 1
Challenges and Authentication in Wireless Sensor Networks by using promising Key Management Protocols
TLDR
A network comprising of several minute wireless sensor nodes which are organized in a dense manner is called as a Wireless Sensor Network (WSN). Expand
  • 2
Performance of Symmetric Encryption Algorithms
TLDR
This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. Expand
  • 1