SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Analysis of routing security-energy trade-offs in wireless sensor networks
International Journal of Security and Networks
IEEE Communications Magazine
Hi-index | 0.00 |
In Wireless Sensor Networks (WSNs), sensors may be deployed in hostile environments or in some security-sensitive applications exposing them to tampering and to many several security issues. As such, developing secure routing protocols for sensor networks is a crucial issue. The heart of security protocols is the key distribution algorithm. Many key distribution protocols were proposed in WSNs, but most of these protocols lack the adaptivity to network conditions. In this paper, we propose a novel hierarchical and secure routing protocol with innovative key distribution for WSNs. The proposed protocol offers a tradeoff between the desired degree of security and energy consumption. When compared to other protocols (e.g., Trusted BS and a pair wise key pre-distribution), our protocol shows enhanced performance with low overhead.