Secure multidimensional range queries in sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
IBE-lite: a lightweight identity-based cryptography for body sensor networks
IEEE Transactions on Information Technology in Biomedicine - Special section on body sensor networks
Microsearch: A search engine for embedded devices used in pervasive computing
ACM Transactions on Embedded Computing Systems (TECS)
Efficient and distributed access control for sensor networks
Wireless Networks
An intelligent information security mechanism for the network layer of WSN: BIOSARP
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
ACS'11 Proceedings of the 11th WSEAS international conference on Applied computer science
Review: Multi-agent systems for protecting critical infrastructures: A survey
Journal of Network and Computer Applications
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
International Journal of Security and Networks
Hi-index | 0.00 |
While symmetric-key schemes are efficient in processing time for sensor networks, they generally require complicated key management, which may introduce large memory and communication overhead. On the contrary, public-key based schemes have simple and clean key management, but cost more computational time. The recent progress of elliptic curve cryptography (ECC) implementation on sensors motivates us to design a public-key scheme and compare its performance with the symmetric-key counterparts. This paper builds the user access control on commercial off-the-shelf sensor devices as a case study to show that the public-key scheme can be more advantageous in terms of the memory usage, message complexity, and security resilience. Meanwhile, our work also provides insights in integrating and designing public-key based security protocols for sensor networks.