A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |
This paper studies a novel location-based design for secure and efficient wireless sensor networks. With this scheme, the sensing area is divided into a number of location cells and a logical group consists of four location cells. A pairwise key is established for each pair of sensor nodes in a logical group based on grid-based bivariate t-degree polynomials. An efficient en-route data authentication method is proposed to limit data authentication within a small neighboring range. In addition, a greedy location-based secure and energy-efficient data aggregation approach is integrated with the design. It further utilizes data aggregation by setting up control groups, applying pattern codes, selecting and switching control head nodes dynamically and periodically. The analysis demonstrate that our design is resilient to node compromise and decrease storage and communication overhead when compared with non location-based designs.