An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Key storage in secure networks
Discrete Applied Mathematics
Secret-key agreement without public-key
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Some New Results on Key Distribution Patterns and BroadcastEncryption
Designs, Codes and Cryptography
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On Unconditionally Secure Robust Distributed Key Distribution Centers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A ramp model for distributed key distribution schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Security for Wireless Ad--hoc Networks
Security for Wireless Ad--hoc Networks
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
A unified model for unconditionally secure key distribution
Journal of Computer Security
A survey of key management schemes in wireless sensor networks
Computer Communications
Modeling pairwise key establishment for random key predistribution in large-scale sensor networks
IEEE/ACM Transactions on Networking (TON)
Security in wireless sensor networks: Research Articles
Wireless Communications & Mobile Computing
Distributed Pseudo-random functions and KDCs
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Communication in key distribution schemes
IEEE Transactions on Information Theory
IEEE Communications Magazine
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
An adaptable and scalable group access control scheme for managing wireless sensor networks
Telematics and Informatics
Cooperative secret delivery in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.01 |
A key pre-distribution scheme is a method by which initially an off-line trusted authority distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key for secure communication. In this paper we present an Asymmetric Key Predistribution Scheme. Instead of assuming that the network is comprised entirely of identical users in conventional key predistribution schemes, the network now consists of a mix of users with different missions, i.e., ordinary users and keying material servers. A group of users, using secret keys preloaded in their memory and public keying material retrieved from one keying material server, can compute a session key. The properties of this method are that, the compromise of keying material servers does not reveal any information about users' secret keys and the session keys of privileged subset of users; if computational assumptions are considered, each user has very low storage requirement. These properties make it attractive for sensor networks. We first formally define the asymmetric key pre-distribution scheme in terms of the entropy and give lower bounds on user's storage requirement and the public keying material size. Then, we present its constructions and applications for sensor networks.