SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Unleashing public-key cryptography in wireless sensor networks
Journal of Computer Security - On IWAP'05
A survey of key management schemes in wireless sensor networks
Computer Communications
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
A lightweight key renewal scheme for clustered sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A simple non-interactive pairwise key establishment scheme in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
LISA: lightweight security algorithm for wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks
IEEE Transactions on Information Forensics and Security
A path-generation framework for real-time query processing in wireless sensor networks
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Hi-index | 0.00 |
Wireless Sensor Networks (WSN) have recently been in the limelight for many domains. The characteristics of sensor networks have imposed various restrictions on their system designs. Since sensor nodes usually are developed by low-cost hardware, one major challenge in the development of many sensor-network applications is to provide high-security features with limited resources. In this paper, we propose a half-key scheme based on the well-known random key pre-distribution scheme and DDHV-D deployment knowledge to provide resource-efficient key management in wireless sensor networks with reduced memory space requirements and better security enforcement. The capability of the proposed approach is evaluated by an analytical model and a series of experiments.