An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A matrix key-distribution scheme
Journal of Cryptology
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Key Distribution Protocol for Digital Mobile Communication Systems
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Key Grids: A Protocol Family for Assigning Symmetric Keys
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
Space-Efficient Keying in Wireless Communication Networks
WIMOB '07 Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Secret instantiation in ad-hoc networks
Computer Communications
Cluster-Based Key Predistribution Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Deterministic key predistribution schemes for distributed sensor networks
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Hi-index | 0.00 |
Predistribution of cryptographic keys is a widely used approach for establishing secure communication between severely resource-constrained nodes with limited or no access to network infrastructure. Many proposed key predistribution schemes make the implicit assumption that message contents need not be kept private from nodes other than the intended recipient. Messages in such schemes are not guaranteed to be confidential-they may be read by nodes within the network other than the intended recipient. In this paper, we present TASK-a symmetric key predistribution scheme that enables secure and confidential communication within wireless networks. TASK distributes keys by generating and reinforcing a series of template key assignment instances. It is parameterized, which allows it to make use of key storage capacities that other recently proposed schemes cannot. We show, through analysis and simulation, that TASK can achieve a level of security superior to that of two recently proposed schemes that also provide confidentiality. We also demonstrate that the techniques used in TASK (namely parameterization, templatization, and selective reinforcement) can be applied to other key assignment schemes for star or bipartite networks.