Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Cryptography with cellular automata
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata
IEEE Transactions on Computers
A new kind of science
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Probing Attacks on Tamper-Resistant Devices
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
On a New Way to Read Data from Memory
SISW '02 Proceedings of the First International IEEE Security in Storage Workshop
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Secret Key Cryptography with Cellular Automata
IPDPS '03 Proceedings of the 17th International Symposium on Parallel and Distributed Processing
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Location-aware key establishment in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
The Strange Logic of Random Graphs
The Strange Logic of Random Graphs
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Hi-index | 0.00 |
We develop a one-way function based key establishment framework for Wireless Sensor Networks (WSNs). The proposed framework allows sensors to establish pairwise session keys at an arbitrary network operation stage using pre-loaded one-way functions. We also present an efficient instantiation of the proposed framework using Cellular Automata (CA). The analysis based on the CA instantiation indicates that our framework possesses a number of nice properties: inherent support for rekeying; quasi-perfect resilience against node compromise; computational efficiency; strong cryptographic strength of generated pairwise keys; a high probability to establish pairwise keys between sensors.