Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
A noble key pre-distribution scheme with LU matrix for secure wireless sensor networks
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An efficient key pre-distribution scheme for secure distributed sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
IEEE Communications Magazine
Hi-index | 0.00 |
Wireless sensor networks have been widely used in a variety of domains which include military sensing and tracking, patient monitoring and health care, etc. When sensor networks are deployed in a hostile environment, security becomes extremely important, as they are vulnerable targets to different types of malicious attacks. Due to the wireless property of sensor devices, the sensor networks may easily be compromised by attackers who modify messages or provide misleading information to other sensor nodes. Therefore, the security of the sensor networks is very important. This paper will present a new efficient key pre-distribution scheme for secure wireless sensor networks. It provides an approach that any pair of sensor nodes can find a common pairwise secret key between them with simple calculation. Compared with previously proposed key pre-distribution schemes, the proposed method could reduce large amounts of computations and communications in both the key pre-distribution step and finding a common secret key for any pair of nodes to achieve secure connectivity.