A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
The heterogeneity and relatively limited resources of the nodes deployed in hierarchical wireless sensor network (WSN) impose a new strategy to guarantee security and confidentiality. A deployment strategy is proposed and focuses on two different levels: complexity of the scheme and security requirement for the application. Three different cryptography mechanisms may be concurrently used in the same framework: PKI distribution, identity-based encryption and symmetric cryptography. As each mechanism has its advantages and disadvantages, criteria are proposed to associate each node with the most relevant security mechanism according to its capability and environment.