Trust model for certificate revocation in ad hoc networks
Ad Hoc Networks
Defending against false-endorsement-based dos attacks in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks
Computer Communications
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
An authentication scheme for filtering injected bogus data in sensor networks
Computer Communications
A novel access control protocol for secure sensor networks
Computer Standards & Interfaces
Secure multidimensional range queries in sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
A Secure Framework for Location Verification in Pervasive Computing
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
A multivariate key-establishment scheme for wireless sensor networks
IEEE Transactions on Wireless Communications
Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
Computer Networks: The International Journal of Computer and Telecommunications Networking
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
Ranging energy optimization for robust sensor positioning based on semidefinite programming
IEEE Transactions on Signal Processing
IBE-lite: a lightweight identity-based cryptography for body sensor networks
IEEE Transactions on Information Technology in Biomedicine - Special section on body sensor networks
A practical inter-sensor broadcast authentication scheme
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Fuzzy adaptive threshold determining in the key inheritance based sensor networks
IEA/AIE'07 Proceedings of the 20th international conference on Industrial, engineering, and other applications of applied intelligent systems
A group-based security policy for wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Bogus data filtering in sensor networks
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
An efficient key establishment scheme for self-organizing sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
Simple hash based message authentication scheme for wireless sensor networks
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks
Computer Communications
An opportunistic batch bundle authentication scheme for energy constrained DTNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
Wormhole-resilient secure neighbor discovery in underwater acoustic networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Network and Computer Applications
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
A novel node level security policy framework for wireless sensor networks
Journal of Network and Computer Applications
Defending against physical destruction attacks on wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Hybrid RSS-RTT localization scheme for indoor wireless networks
EURASIP Journal on Advances in Signal Processing
A forward authentication key management scheme for heterogeneous sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
An efficient location-based compromise-tolerant key management scheme for sensor networks
Information Processing Letters
Applying time-bound hierarchical key assignment in wireless sensor networks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
Achieving distributed user access control in sensor networks
Ad Hoc Networks
On broadcast authentication in wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users
Wireless Personal Communications: An International Journal
Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks
Mobile Networks and Applications
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
Key inheritance-based false data filtering scheme in wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
An improved scheme for false data filtering in wireless sensor networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
Topological detection on wormholes in wireless ad hoc and sensor networks
IEEE/ACM Transactions on Networking (TON)
A Privacy-Strengthened Scheme for E-Healthcare Monitoring System
Journal of Medical Systems
An efficient anonymous communication protocol for wireless sensor networks
Wireless Communications & Mobile Computing
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Computers and Electrical Engineering
On the node clone detection in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.08 |
Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a suite of location-based compromise-tolerant security mechanisms. Based on a new cryptographic concept called pairing, we propose the notion of location-based keys (LBKs) by binding private keys of individual nodes to both their IDs and geographic locations. We then develop an LBK-based neighborhood authentication scheme to localize the impact of compromised nodes to their vicinity. We also present efficient approaches to establish a shared key between any two network nodes. In contrast to previous key establishment solutions, our approaches feature nearly perfect resilience to node compromise, low communication and computation overhead, low memory requirements, and high network scalability. Moreover, we demonstrate the efficacy of LBKs in counteracting several notorious attacks against sensor networks such as the Sybil attack, the identity replication attack, and wormhole and sinkhole attacks. Finally, we propose a location-based threshold-endorsement scheme, called LTE, to thwart the infamous bogus data injection attack, in which adversaries inject lots of bogus data into the network. The utility of LTE in achieving remarkable energy savings is validated by detailed performance evaluation.