نتایج جستجو برای: random key predistribution

تعداد نتایج: 820182  

Journal: :Theoretical Computer Science 2012

2014
Filip Jurnecka Martin Stehlík Vashek Matyas

Wireless sensor networks are being deployed in wide variety of applications, including military sensing and tracking, environment monitoring, patient monitoring and tracking, smart environments, etc. When a wireless sensor network is deployed in such hostile environment, security becomes an extremely important issue. Confidentiality, integrity, and availability are typical security goals for wi...

2009
Osman Yağan Armand M. Makowski

Random key graphs are random graphs induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. For this class of random graphs we show the existence of a zero-one law for the appearance of triangles, and identify the corresponding critical scaling. This is done by applying the method of first and second moments to the number of triangles i...

2009
Osman Yağan Armand M. Makowski

We consider the random graph induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. We report on recent results concerning a conjectured zero-one law for graph connectivity, and provide simple proofs for some special cases.

Journal: :IACR Cryptology ePrint Archive 2009
Anupam Pattanayak B. Majhi

Transversal Design is a well known combinatorial design that has been used in deterministic key predistribution scheme. Merging of blocks in a design sometimes helps to obtain a key predistribution scheme with better performance. A deterministic merging strategy to merge the blocks has been discussed. Also, a simple key establishment method for transversal design based key predistribution schem...

2003
Mahalingam Ramkumar Nasir Menon

The nature of Mobile Ad hoc NETworks (MANET), demands stringent requirements on primitives that could be used to secure such networks. Mobility imposes restrictions on memory and processor requirements due to limited battery life. The ad hoc nature warrants schemes that could operate for extended periods without referring to a Trusted Authority (TA). Additionally, any enabling scheme for securi...

2009
Yi Jiang Hao-Shan Shi

⎯In recent years, several random key predistribution schemes have been proposed to bootstrap keys for encryption, but the problem of key and node revocation has received relatively little attention. In this paper, based on a random key pre-distribution scheme using clustering, we present a novel random key revocation protocol, which is suitable for large scale networks greatly and removes compr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید