Communications of the ACM
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Group Key Agreement Efficient in Communication
IEEE Transactions on Computers
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Security Framework for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Journal of Systems and Software
Computer Security and Cryptography
Computer Security and Cryptography
Attacking elliptic curve cryptosystems with special-purpose hardware
Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays
A survey on clustering algorithms for wireless sensor networks
Computer Communications
A novel access control protocol for secure sensor networks
Computer Standards & Interfaces
A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
Ultra-Low Energy Wireless Sensor Networks in Practice: Theory, Realization and Deployment
Ultra-Low Energy Wireless Sensor Networks in Practice: Theory, Realization and Deployment
ACM Transactions on Sensor Networks (TOSN)
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
Designing secure sensor networks
IEEE Wireless Communications
IEEE Wireless Communications
Enhanced novel access control protocol over wireless sensor networks
IEEE Transactions on Consumer Electronics
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Hi-index | 0.00 |
Access control is a prime technology to prevent unauthorized access to private information, which is one of the essential issues appearing in secure group communication (SGC) of wireless sensor networks (WSNs). Many studies have made good progress on access control; however, their methods are inadequate to cope with this new issue for SGC-based WSNs since of their inflexibility, inefficiency, insecurity, or small-scale. This paper, based on cryptographic theory, develops a scheme to manage the group access key used in SGC-based WSNs. In comparison with previous studies, the proposed method provides two main advantages. First, regarding adaptability, the administrator can assign access privilege flexibly, regardless of whether the relation among entities is hierarchical, peer-to-peer or heterogeneous. Second, regarding scalability, when an entity joins or leaves such a WSN, the administrator can re-generate the secure filter function alone and then send it to the entities (i.e., sensor nodes or base stations). While receiving this new secure filter function, the existing entities merely need to compute hash computation once to obtain the updating group access key, despite operating in an incremental system with a large number of entities.