نتایج جستجو برای: random key predistribution
تعداد نتایج: 820182 فیلتر نتایج به سال:
Wireless sensor networks are being deployed in wide variety of applications, including military sensing and tracking, environment monitoring, patient monitoring and tracking, smart environments, etc. When a wireless sensor network is deployed in such hostile environment, security becomes an extremely important issue. Confidentiality, integrity, and availability are typical security goals for wi...
Random key graphs are random graphs induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. For this class of random graphs we show the existence of a zero-one law for the appearance of triangles, and identify the corresponding critical scaling. This is done by applying the method of first and second moments to the number of triangles i...
We consider the random graph induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. We report on recent results concerning a conjectured zero-one law for graph connectivity, and provide simple proofs for some special cases.
Transversal Design is a well known combinatorial design that has been used in deterministic key predistribution scheme. Merging of blocks in a design sometimes helps to obtain a key predistribution scheme with better performance. A deterministic merging strategy to merge the blocks has been discussed. Also, a simple key establishment method for transversal design based key predistribution schem...
The nature of Mobile Ad hoc NETworks (MANET), demands stringent requirements on primitives that could be used to secure such networks. Mobility imposes restrictions on memory and processor requirements due to limited battery life. The ad hoc nature warrants schemes that could operate for extended periods without referring to a Trusted Authority (TA). Additionally, any enabling scheme for securi...
⎯In recent years, several random key predistribution schemes have been proposed to bootstrap keys for encryption, but the problem of key and node revocation has received relatively little attention. In this paper, based on a random key pre-distribution scheme using clustering, we present a novel random key revocation protocol, which is suitable for large scale networks greatly and removes compr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید