Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The protection of wireless sensor networks is an important task, especially for critical situations such as intrusion detection, tamper monitoring, or military applications. To date, much of the emphasis on protecting sensor networks has focused on key management and secure routing. However, as sensors become more capable and ubiquitous, the need for more fine-grained control over their resources grows. In this paper, we present a security policy for wireless sensor networks which provide designers and administrators the ability to fine-tune access to sensor resources. We build on the notion of group-based key establishment to show how group membership can be utilized in deploying a dynamic, robust, and flexible security policy for wireless sensor networks.