SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
IEEE Communications Magazine
Hi-index | 0.00 |
For secure sensor network communication, we propose a key establishment mechanism applying polynomial-based key predistribution scheme under the clustered sensor network architecture, and propose authentication mechanism. Every pair of neighboring nodes can calculate its own pairwise key using polynomial shares predistributed. Gateway nodes interconnecting the clusters play the role of stepping stones. For hop-by-hop authentication, every node adds MAC computed using pairwise key between its upstream node and itself. Broadcast authentication can be achieved using one-time digital signature.