Elliptic curves in cryptography
Elliptic curves in cryptography
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
Introduction to cryptography: principles and applications
Introduction to cryptography: principles and applications
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
LISA: lightweight security algorithm for wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Error compensation algorithm in wireless sensor networks synchronisation
International Journal of Sensor Networks
A half-key key management scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
A novel key management scheme for wireless embedded systems
ACM SIGAPP Applied Computing Review
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
International Journal of Sensor Networks
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Hi-index | 0.00 |
The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless personal area networks. Another important driving force of WSNs is the ZigBee Alliance, an industrial alliance concentrating on WSNs. This paper addresses the security of WSNs with respect to the protocol stack defined by IEEE 802.15.4 and the ZigBee Alliance. Some security problems are identified and remedies are suggested. A new security architecture based on a lightweight public key scheme, called Derivable Public Key (DPK), is proposed. The DPK scheme significantly simplifies the public key operations and reduces the related cost by eliminating the need for distributing and storing public keys other than the one from the trust centre. It makes possible to support authentications for multicast/broadcast communications in WSNs, which are not available and account for many attacks so far.