SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
The handbook of ad hoc wireless networks
The handbook of ad hoc wireless networks
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Scalable link-layer key agreement in sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
The capacity of wireless networks
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Despite extensive research on flat ad hoc networks, meeting satisfactory security levels in sensor networks presents many problems. The main reason is that these networks are typically designed based on hierarchal structures. In this paper, we propose an efficient scheme for authentication and key management in hierarchical ad hoc sensor networks using symmetric polynomials. In the proposed method, the processing requirements and traffic load are proportional to the processing capability and required bandwidth in each layer. An ad hoc node at the lowest level of the hierarchy uses symmetric cryptography. With more processing capabilities, entities in higher layers use public key cryptography. Performance results show the superiority of the proposed method in comparison with previous approaches developed for hierarchical ad hoc sensor networks.