A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Security in Wireless Actor & Sensor Networks (WASN): Towards A Hierarchical Re-Keying Design
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
IEEE Network: The Magazine of Global Internetworking
Towards a Lightweight Security Solution for User-Friendly Management of Distributed Sensor Networks
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Hi-index | 0.00 |
WSAN (Wireless Sensor and Actor Network) has become a promising direction in research. However, up to now, little work has been done in WSAN, especially in security issues. In this paper, we first discuss several challenges in security of WSAN. Aiming at these challenges, we propose our key establishment scheme for heterogeneous nodes in WSAN. In our scheme, authentication and key establishment can be finished with just one round-trip communication. Further more, our scheme is especially designed for heterogeneous architectures. Capability of resource-rich actors are fully used. Finally, our scheme and existing schemes for Ad Hoc Networks and WSN (Wireless Sensor Network) are compared and analyzed.