The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A Concrete Security Treatment of Symmetric Encryption
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A Survey of Middleware for Sensor Network and Challenges
ICPPW '06 Proceedings of the 2006 International Conference Workshops on Parallel Processing
Hi-index | 0.00 |
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small memories and processors, limited energy and tiny packets, sensor networks cannot afford traditional luxury security solutions; this limitation causes security threats. There are several important security challenges, including access control, message integrity and confidentiality, and trust solutions that require us to use a careful design of resource constraints for pursuing more enhanced security solutions for a wireless sensor network. In this paper, we present a new idea of persistent security solutions that support trust for general purpose Wireless Sensor Networks.