Optimal transmission ranges for mobile communication in linear multihop packet radio networks
Wireless Networks - Special issue on performance evaluation methods for wireless networks
Password authentication with insecure communication
Communications of the ACM
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Revisiting random key pre-distribution schemes for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Near-Optimal Node Clustering in Wireless sensor Networks for Environment Monitoring
AINA '07 Proceedings of the 21st International Conference on Advanced Networking and Applications
ITNG '07 Proceedings of the International Conference on Information Technology
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks
ICDCSW '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops
Zero pre-shared secret key establishment in the presence of jammers
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Distributed KDC-based random pairwise key establishment in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
A calculus for the analysis of wireless network security protocols
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
Hi-index | 0.00 |
The unique properties of wireless sensor networks make key distribution a particularly difficult problem. Two protocols, LEAP+ and Eschenauer-Gligor (EG), offer creative and effective solutions to this problem via time-limited key establishment and randomized key pre-distribution, respectively. However, LEAP+ key establishment may be thwarted by jamming attacks, and EG is vulnerable to node compromise attacks. In this paper, we offer a hybrid of these two schemes that preserves the desirable properties of each scheme, but is immune to each scheme's greatest weakness.