An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Unleashing public-key cryptography in wireless sensor networks
Journal of Computer Security - On IWAP'05
A survey of key management schemes in wireless sensor networks
Computer Communications
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
A lightweight key renewal scheme for clustered sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Implementation of Lightweight TCP/IP for Small, Wireless Embedded Systems
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Distributed visual-target-surveillance system in wireless sensor networks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
A simple non-interactive pairwise key establishment scheme in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
LISA: lightweight security algorithm for wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
A survey on localization for mobile wireless sensor networks
MELT'09 Proceedings of the 2nd international conference on Mobile entity localization and tracking in GPS-less environments
Cyber-physical systems: the next computing revolution
Proceedings of the 47th Design Automation Conference
A survey on IP-based wireless sensor network solutions
International Journal of Communication Systems
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems
ICDM '10 Proceedings of the 2010 IEEE International Conference on Data Mining
Proceedings of the 5th International Conference on Communication System Software and Middleware
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Wi-Design: A modelling and optimization tool for wireless embedded systems in buildings
LCN '11 Proceedings of the 2011 IEEE 36th Conference on Local Computer Networks
Optimizing Bandwidth of Call Traces for Wireless Embedded Systems
IEEE Embedded Systems Letters
Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks
IEEE Transactions on Information Forensics and Security
Proceedings of the 2013 Research in Adaptive and Convergent Systems
A path-generation framework for real-time query processing in wireless sensor networks
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
Information Sciences: an International Journal
Hi-index | 0.00 |
Wireless Embedded Systems (WEBs) has attracted significant interest in recent years, for instance, Wireless Sensor Networks (WSN), have recently been in the limelight for many domains. The characteristics of WEBs have imposed various restrictions on their system designs. Since embedded systems usually are developed by low-cost hardware, one major challenge in the development of many WEBs applications is to provide high-security features with limited resources. In this paper, we propose a novel key establishment scheme, named half-key scheme that based on the well-known random key pre-distribution scheme and DDHV-D deployment knowledge to provide resource-efficient key management in WEBs with reduced memory space requirements and better security enforcement. The capability of the proposed approach is evaluated by an analytical model and a series of experiments.