A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Secure and Continuous Management of Heterogeneous Ad Hoc Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 01
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
Sensor networks are suitable for a variety of commercial and military applications due to their self-organization characteristics and distributed nature. As a fundamental requirement for security functionality in sensor networks, key management plays a central role in authentication and encryption. In this paper, we describe an Adaptive Key Selection (AKS) scheme for multi-deployment in sensor networks and analyze the scheme in the aspects of security, connectivity and overhead. Our analysis shows that the AKS scheme can greatly improve the connectivity of sensor nodes while maintaining the security of an existing multi-deployment scheme.