An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Secret-key agreement without public-key
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Geographic gossip: efficient aggregation for sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Extended Abstract: Forward-Secure Sequential Aggregate Authentication
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
ACM Transactions on Information and System Security (TISSEC)
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks
IEEE Transactions on Mobile Computing
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
SRDS '08 Proceedings of the 2008 Symposium on Reliable Distributed Systems
DISH: Distributed Self-Healing
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Collaborative authentication in unattended WSNs
Proceedings of the second ACM conference on Wireless network security
Data Security in Unattended Wireless Sensor Networks
IEEE Transactions on Computers
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
Intrusion-resilience in mobile unattended WSNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Parallel key-insulated public key encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
IEEE Wireless Communications
Key management issues in wireless sensor networks: current proposals and future developments
IEEE Wireless Communications
Decentralized erasure codes for distributed networked storage
IEEE Transactions on Information Theory
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
New adversary and new threats: security in unattended sensor networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Unattended wireless sensor networks operating in hostile environments face the risk of compromise. Given the unattended nature, sensors must safeguard their sensed data of high value temporarily. However, saving data inside a network creates security problems due to the lack of tamper-resistance of sensors and the unattended nature of the network. In some occasions, a network controller may periodically dispatch mobile sinks to collect data. If a mobile sink is given too many privileges, it will become very attractive for attack. Thus, the privilege of mobile sinks should be restricted. Additionally, secret keys should be used to achieve data confidentiality, integrity, and authentication between communicating parties. To address these security issues, we present mAKPS, an asymmetric key predistribution scheme with mobile sinks, to facilitate the key distribution and privilege restriction of mobile sinks, and schemes for sensors to protect their collected data in unattended wireless sensor networks. Copyright © 2011 John Wiley & Sons, Ltd.