GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Building efficient wireless sensor networks with low-level naming
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Geographic routing for wireless networks
Geographic routing for wireless networks
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location Verification Algorithms forWireless Sensor Networks
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Hi-index | 0.00 |
Authentication is necessary to not only data exchange processes but also network administrative tasks in Wireless Sensor Networks. So far, only data authentication has drawn much attention from the research community. We propose an efficient Distributed Node Authentication (DNA) scheme that utilizes geographic location and trust relationship among neighboring sensor nodes to authenticate the identity of sensor nodes. Analysis and simulation results demonstrate that DNA is robust against node failure/sleeping and resilient to network attackers.