SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Analysis of routing security-energy trade-offs in wireless sensor networks
International Journal of Security and Networks
A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks
Journal of Parallel and Distributed Computing
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
International Journal of Communication Networks and Distributed Systems
ACM Transactions on Sensor Networks (TOSN)
A clustered routing protocol with distributed intrusion detection for wireless sensor networks
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
A fuzzy-based en-route filtering scheme in sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Integrated Computer-Aided Engineering
A survey on secure hierarchical routing protocols in wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
PERSEN: power-efficient logical ring based key management for clustered sensor networks
International Journal of Sensor Networks
A dynamic TDMA based scheme for securing query processing in WSN
Wireless Networks
SecDEACH: secure and resilient dynamic clustering protocol preserving data privacy in WSNs
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
On the optimal allocation of adversarial resources
Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking
Key establishment protocols for secure communication in clustered sensor networks
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, low-cost, automated sensing and monitoring of different environments of interest. Cluster-based communication has been proposed for these networks for various reasons such as scalability and energy efficiency. In this paper, we investigate the problem of adding security to cluster-based communication protocols for homogeneous wireless sensor networks consisting of sensor nodes with severely limited resources, and propose a security solution for LEACH, a protocol where clusters are formed dynamically and periodically. Our solution uses building blocks from SPINS, a suite of highly optimized security building blocks that rely solely on symmetric-key methods; is lightweight and preserves the core of the original LEACH.