Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Designing Identification Schemes with Keys of Short Size
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Localization for mobile sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
On the security of stepwise triangular systems
Designs, Codes and Cryptography
DRBTS: Distributed Reputation-based Beacon Trust System
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
Secure Location Verification with Hidden and Mobile Base Stations
IEEE Transactions on Mobile Computing
Cryptanalysis of SFLASH with Slightly Modified Parameters
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Algebraic Attack on HFE Revisited
ISC '08 Proceedings of the 11th international conference on Information Security
Square-Vinegar Signature Scheme
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
A multivariate key-establishment scheme for wireless sensor networks
IEEE Transactions on Wireless Communications
Cryptanalysis of HFE with internal perturbation
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
l-invertible cycles for multivariate quadratic (MQ) public key cryptography
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Practical cryptanalysis of SFLASH
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
IEEE Transactions on Mobile Computing
Security-aware routing and localization for a directional mission critical network
IEEE Journal on Selected Areas in Communications
Mobile beacon-based 3D-localization with multidimensional scaling in large sensor networks
IEEE Communications Letters
A zero-knowledge identification scheme based on the q-ary syndrome decoding problem
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
A "medium-field" multivariate public-key encryption scheme
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Rainbow, a new multivariable polynomial signature scheme
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Public-key cryptography using paraunitary matrices
IEEE Transactions on Signal Processing
Evaluation of Localization Attacks on Power-Modulated Challenge–Response Systems
IEEE Transactions on Information Forensics and Security
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
IEEE Communications Magazine
Secure localization algorithms for wireless sensor networks
IEEE Communications Magazine
Secure positioning in wireless networks
IEEE Journal on Selected Areas in Communications
HiRLoc: high-resolution robust localization for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Secure localization and authentication in ultra-wideband sensor networks
IEEE Journal on Selected Areas in Communications - Part 1
Source Localization in Wireless Sensor Networks From Signal Time-of-Arrival Measurements
IEEE Transactions on Signal Processing
Field Reconstruction in Sensor Networks With Coverage Holes and Packet Losses
IEEE Transactions on Signal Processing
Hi-index | 0.00 |
In this research paper, the positions of sensor nodes are used for generating their public keys. In a wireless sensor networks (WSN), the nodes observe the environment in their vicinity and send the position specific data to the sink. Since the position and sensed data of a sensor are linked up to each other, the sensor position can be used as its unique public key. Multivariate cryptography offers a lightweight alternative to public key cryptography for sensor networks and position as public key can enhance its viability for WSN. In this study, we proposed a position-based multivariate cryptosystem for WSN that verifies the position of the sensor node and also prevented from the collusion attack. The performance and security analysis of the proposed scheme demonstrates that reduce storage overhead, communication overhead and prevent collusion attack in various contexts are possible within lightweight computational constraints.