R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks
Proceedings of the 2010 ACM Symposium on Applied Computing
A calculus for the analysis of wireless network security protocols
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
An intelligent information security mechanism for the network layer of WSN: BIOSARP
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
ACS'11 Proceedings of the 11th WSEAS international conference on Applied computer science
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
Hi-index | 0.00 |
This paper presents a security-enhanced variant of LEAP+, called LEAP++. The proposed scheme not only improves the security against node capture attacks but also provides additional robustness against denial-of-service and node fabrication attacks. It also provides an easy way to detect in many cases, if not all, node replication and wormhole attacks during key establishment. We also propose a variant of LEAP++ robust even under master key compromise using a small-size ECDH.