Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Next century challenges: scalable coordination in sensor networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
A Complete Set of Protocols for Distributed Key Management in Clustered Wireless Sensor Networks
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
Hi-index | 0.00 |
One of the key issues for wireless sensor network is designing viable security mechanisms for the protection of confidentiality, integrity and authentication to prevent malicious attacks, but with nodes' limited capabilities. Efficient Key Distribution mechanisms is so important for WSN's security. In this paper, we present two key distribution schemes based on two-layer structure for wireless sensor network, which relies the BFIBE algorithm [5] to build the Upper-Layer security links. Other keys for link encryption are distributed and agreed with the help of Upper-Layer nodes. To our knowledge, ours is the first work to discuss implementation issues on the key distribution mechanisms based on two-layer structure which only use BFIBE algorithm in the Upper-Layer. The presented schemes can torrent nodes' capture. As for security, computational complexity, and efficiency, the presented schemes have certain advantages.