SPINS: security protocols for sensor networks
Wireless Networks
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
ICDCSW '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Data-centric storage in sensornets with GHT, a geographic hash table
Mobile Networks and Applications
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Securing Distributed Data Storage and Retrieval in Sensor Networks
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Extended Abstract: Forward-Secure Sequential Aggregate Authentication
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Towards in-situ data storage in sensor databases
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
An efficient key predistribution scheme for ad hoc network security
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Recent advances in distributed in-network data storage and access control have led to active research in efficient and robust data management in wireless sensor networks (WSNs). Although numerous schemes have been proposed this far, most of them do not provide enough attention towards exploiting user hierarchy and sensor heterogeneity, which is quite a practical issue especially when deploying WSNs in mission-critical application scenarios. In this paper, we propose an efficient secret-key cryptography-based (SKC) fine-grained data access control scheme for securing both distributed data storage and retrieval. In our design, secret keying information for data encryption and decryption are constructed based on the scheme of Blundo et al. [1] with information-theoretic security. To further enhance the security strength, we then propose an efficient user revocation scheme based on the idea of blinded Merkle hash tree construction. Extensive performance analysis shows that the proposed schemes are very efficient and practical for WSNs.