Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Undetectable on-line password guessing attacks
ACM SIGOPS Operating Systems Review
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
A key distribution protocol using event markers
ACM Transactions on Computer Systems (TOCS)
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Three-party encrypted key exchange: attacks and a solution
ACM SIGOPS Operating Systems Review
More Efficient Password-Authenticated Key Exchange
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Towards a classification of key agreement protocols
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
A Class of Flexible and Efficient Key Management Protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
A survey of application distribution in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
A Design Proposal of Security Architecture for Medical Body Sensor Networks
BSN '06 Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
Wireless Communications & Mobile Computing - Wireless Network Security
Security for Wireless Sensor Networks (Advances in Information Security)
Security for Wireless Sensor Networks (Advances in Information Security)
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On session key construction in provably-secure key establishment protocols
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Security in wireless sensor networks: considerations and experiments
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
Research: Secure and minimal protocols for authenticated key distribution
Computer Communications
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
IEEE Communications Magazine
RETRACTED: Impacts of sensor node distributions on coverage in sensor networks
Journal of Parallel and Distributed Computing
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
International Journal of Sensor Networks
Hi-index | 0.00 |
Wireless sensor networks provide solutions to a range of monitoring problems. However, they also introduce a new set of challenges mainly due to small memories, weak processors, and limited energy. As an example application, body sensor network is examined in detail in this paper. It is used as the basis for the requirements for the proposed key establishment protocols. Four protocols are proposed, which body sensors can use to derive keys from cryptographically weak environmental data. This is achieved without the necessity of using traditional encryption. We map the applicability of each protocol to the corresponding characteristics found in different types of environmental data. Detailed analysis of each of the protocols is provided. The protocols were implemented in TinyOS and simulated using TOSSIM. Energy consumption and memory requirements are analysed and found that an RSA implementation of our protocols has some advantages over an ECC implementation.