Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key distribution techniques for sensor networks
Wireless sensor networks
Short Signatures from the Weil Pairing
Journal of Cryptology
A General Cooperative Intrusion Detection Architecture for MANETs
IWIA '05 Proceedings of the Third IEEE International Workshop on Information Assurance
Security for Wireless Ad--hoc Networks
Security for Wireless Ad--hoc Networks
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks
IEEE Internet Computing
The Smart Phone: A Ubiquitous Input Device
IEEE Pervasive Computing
Secure communication mechanisms for GSM networks
IEEE Transactions on Consumer Electronics
A framework for misuse detection in ad hoc Networks-part I
IEEE Journal on Selected Areas in Communications
A framework for misuse detection in ad hoc networks- part II
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Numerous applications, ranging from disaster management to smart buildings, have been proposed for sensor networks. The practicality of these applications depends on the ability of users to interact with these networks, in many cases in real time. In this paper we propose that cell phones interact with sensor networks and obtain the relevant information in real time. Cell phones can communicate with cellular network and sensor networks at the same time. This unique ability is used to provide better authentication and security. We propose an architecture for these networks along with protocols that can be used to establish secure communications. In our architecture, we use gateways, as intermediate nodes between cell phones and sensor nodes. We propose solutions to detect and revoke captured gateways.