Handbook of Applied Cryptography
Handbook of Applied Cryptography
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Random key predistribution for wireless sensor networks using deployment knowledge
Computing - Special Issue on the occasion of the 8th Central European Conference on Cryptography
Generalizations of Horner's rule for polynomial evaluation
IBM Journal of Research and Development
A novel intrusion detection framework for IP-based sensor networks
ICOIN'09 Proceedings of the 23rd international conference on Information Networking
A security analysis for wireless sensor mesh networks in highly critical systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Flexible key exchange negotiation for wireless sensor networks
Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling access control for cyber-physical systems using reputation
Computers and Electrical Engineering
On the features and challenges of security and privacy in distributed internet of things
Computer Networks: The International Journal of Computer and Telecommunications Networking
Performance analysis of multivariate cryptosystem schemes for wireless sensor network
Computers and Electrical Engineering
A dependability evaluation tool for the Internet of Things
Computers and Electrical Engineering
CP2: Cryptographic privacy protection framework for online social networks
Computers and Electrical Engineering
An Efficient Multi-Path Self-Organizing Strategy in Internet of Things
Wireless Personal Communications: An International Journal
A Security Differential Game Model for Sensor Networks in Context of the Internet of Things
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
If a wireless sensor network (WSN) is to be completely integrated into the Internet as part of the Internet of Things (IoT), it is necessary to consider various security challenges, such as the creation of a secure channel between an Internet host and a sensor node. In order to create such a channel, it is necessary to provide key management mechanisms that allow two remote devices to negotiate certain security credentials (e.g. secret keys) that will be used to protect the information flow. In this paper we will analyse not only the applicability of existing mechanisms such as public key cryptography and pre-shared keys for sensor nodes in the IoT context, but also the applicability of those link-layer oriented key management systems (KMS) whose original purpose is to provide shared keys for sensor nodes belonging to the same WSN.