A new distributed algorithm to find breadth first search trees
IEEE Transactions on Information Theory
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A Low-Energy Key Management Protocol for Wireless Sensor Networks
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Taming the underlying challenges of reliable multihop routing in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
A Definition for Information System Survivability
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
Link-level measurements from an 802.11b mesh network
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Maximum lifetime routing in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks
IEEE Transactions on Mobile Computing
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Energy and QoS Aware Routing in Wireless Sensor Networks
Cluster Computing
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Lossy network correlated data gathering with high-resolution coding
IEEE/ACM Transactions on Networking (TON) - Special issue on networking and information theory
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Energy-efficient broadcasting in all-wireless networks
Wireless Networks
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
A survey of key management schemes in wireless sensor networks
Computer Communications
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Efficient Load-Balanced Clustering Algorithms for wireless sensor networks
Computer Communications
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
IEEE Transactions on Dependable and Secure Computing
A public key technology platform for wireless sensor networks
Proceedings of the 6th ACM conference on Embedded network sensor systems
Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous Sensor Networks
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
A Key Management Scheme for Cluster Based Wireless Sensor Networks
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
Key Management for Wireless Sensor Networks Using Trusted Neighbors
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
An energy and communication efficient group key in sensor networks using elliptic curve polynomial
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
An improved key management scheme for heterogeneity wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Optimal Distributed Detection in Clustered Wireless Sensor Networks
IEEE Transactions on Signal Processing - Part II
A framework for a distributed key management scheme in heterogeneous wireless sensor networks
IEEE Transactions on Wireless Communications
Survey Secure and reliable clustering in wireless sensor networks: A critical survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks
Journal of Parallel and Distributed Computing
Hi-index | 0.00 |
Information security in infrastructureless wireless sensor networks (WSNs) is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in order to monitor, gather, disseminate, and provide the sensed data to the command node. Various studies have focused on key establishment schemes in homogeneous WSNs. However, recent research has shown that achieving survivability in WSNs requires a hierarchy and heterogeneous infrastructure. In this paper, to address security issues in the heterogeneous WSNs, we propose a secure clustering scheme along with a deterministic pairwise key management scheme based on public key cryptography. The proposed security mechanism guarantees that any two sensor nodes located in the same cluster and routing path can directly establish a pairwise key without disclosing any information to other nodes. Through security performance evaluation, it is shown that the proposed scheme guarantees node-to-node authentication, high resiliency against node capture, and minimum memory space requirement.