2008 Second International Conference on Sensor Technologies and Applications (Sensorcomm 2008) 2008
DOI: 10.1109/sensorcomm.2008.85
|View full text |Cite
|
Sign up to set email alerts
|

Key Management Mechanisms in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…XRD patterns of Ba 2 Zn 2 Fe 28 O 46 hexaferrite powder, synthesized using citrate sol-gel route for different temperatures (1100 °C and 1250 °C) are shown in Figure 2. The crystallite size (D) of the synthesized Ba 2 Zn 2 Fe 28 O 46 powder calcined at different temperature was calculated using a Debye Scherrer formula from the full-width at half-maximum (FWHM) of the most intense (0032) peak [12][13][14][15] .…”
Section: Xrd Analysismentioning
confidence: 99%
“…XRD patterns of Ba 2 Zn 2 Fe 28 O 46 hexaferrite powder, synthesized using citrate sol-gel route for different temperatures (1100 °C and 1250 °C) are shown in Figure 2. The crystallite size (D) of the synthesized Ba 2 Zn 2 Fe 28 O 46 powder calcined at different temperature was calculated using a Debye Scherrer formula from the full-width at half-maximum (FWHM) of the most intense (0032) peak [12][13][14][15] .…”
Section: Xrd Analysismentioning
confidence: 99%
“…The WSNs are application-oriented usually used in battlefield, environment monitoring, etc. [1]. Attacks from outside or inside of the network may destroy the sensor network, so it is important to make nodes trusted before a WSN exchange data, effective key management strategies among nodes, Cluster Heads and Base Station are the key methods to enhance the security of WSNs.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the limited capability of computing and storage of energy of a Wireless sensor network node, the more mature key management scheme in a wired or a conventional wireless network cannot be directly applied to WSNs [2]. Therefore, it is necessary to study the key management scheme which is suitable for characteristics of WSNs.…”
Section: Introductionmentioning
confidence: 99%