Cryptography with cellular automata
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Habitat monitoring with sensor networks
Communications of the ACM - Wireless sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Time synchronization attacks in sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Security Framework for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
TinySA: a security architecture for wireless sensor networks
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Effective pair-wise key establishment scheme for wireless sensor networks
Proceedings of the 2nd international conference on Security of information and networks
Designing secure sensor networks
IEEE Wireless Communications
IEEE Communications Magazine
iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Hi-index | 0.00 |
A wireless sensor network WSN consists of a large number of resource constrained sensor nodes, usually deployed in hostile environments, where they face a variety of malicious attacks. To address the security vulnerabilities in WSN, this paper proposes an efficient security framework ESF, which comprises of two security building blocks. The first one security building block is to establish key between the sending and receiving nodes while other component provides confidentiality and integrity of data. Owing to the limited resources available with the sensor nodes, ESF avoids intensive computations like public key cryptography and encryption mechanisms. Analysis of ESF shows that the framework provides a secure environment and resistant against the wireless threats using simple bit-wise operations and cryptographic hash functions.