Perfectly secure key distribution for dynamic conferences
Information and Computation
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM - Special 25th Anniversary Issue
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks
IEEE Transactions on Mobile Computing
A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
IEEE Transactions on Wireless Communications
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
Private key agreement and secure communication for heterogeneous sensor networks
Journal of Parallel and Distributed Computing
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A framework for a distributed key management scheme in heterogeneous wireless sensor networks
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
A key challenge for the protection of heterogeneous wireless sensor networks (HWSNs) is how to enable sensor nodes to establish shared cryptographic keys in an authentic and resource-efficient manner for their secure communications. So far, a number of schemes have been developed to address this challenge. However, a main shortcoming of these schemes is that their use of sensor resources is not properly balanced. This has motivated us to propose a new lightweight scheme to rectify the problem. The scheme only employs symmetric cryptosystems for its design. It takes advantage of the hierarchical clustering feature of a HWSN to deliver a novel way of building vertical key shareability before sensor deployment to enable horizontal key shareability after the deployment for authentic shared key establishment. The scheme evaluation shows that it offers strong authenticity and resilience against various security threats, and is more resource-efficient, flexible and scalable than related work.