An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Middleware challenges for wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Revisiting random key pre-distribution schemes for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Evolutionary design of message efficient secrecy amplification protocols
EuroGP'12 Proceedings of the 15th European conference on Genetic Programming
Hi-index | 0.00 |
Sensor network is a notion denoting an interesting subset of self-organising wireless networks. These networks are rather dense as each node have typically more than dozen neighbours, and large - with tens to hundreds thousands of nodes. Applications of such networks assume distributed environmental sensing performed by each sensor in the network, where data from a particular sensor gain value only when combined with data from a relatively high number of other sensors. One of the open security questions in this specific environment is a possibility to lower requirements on key distribution and key management and thus decrease production costs. One of the possible ways is ''key infection''. The paper recaps a protocol and already published results. It also elaborates the concept of key infection by introducing a new variant of security amplification protocol, and presents some interesting results obtained by simulations.