Password authentication with insecure communication
Communications of the ACM
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
The nesC language: A holistic approach to networked embedded systems
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
Revisiting random key pre-distribution schemes for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks
IEEE Transactions on Mobile Computing
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A Complete Set of Protocols for Distributed Key Management in Clustered Wireless Sensor Networks
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
A Mobicast Routing Protocol in Vehicular Ad-Hoc Networks
Mobile Networks and Applications
Hi-index | 0.00 |
In this paper, we discuss a basic key management protocol togenerate and distribute the keys required for a secure groupcommunication system, which also preserves the backward and forwardsecrecies. We devise a few relaxed policies for rekeying andformulate an enhanced set of protocols for key management. All thecommunications in the protocols are properly authenticated usingElliptic Curve Digital Signature scheme. The relaxed protocolsreduce the number of rekeying to almost 25%, thus saving energy.The security analysis shows that our protocols can withstandseveral possible security attacks especially the serious one, thenode capture attack.