ABYSS: An Architecture for Software Protection
IEEE Transactions on Software Engineering
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Next century challenges: mobile networking for “Smart Dust”
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
OCB: a block-cipher mode of operation for efficient authenticated encryption
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
The Strange Logic of Random Graphs
The Strange Logic of Random Graphs
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Poster abstract: statistical en-route filtering in large scale sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Robust key establishment in sensor networks
ACM SIGMOD Record
Scalable Cryptographic Key Management in Wireless Sensor Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Expansion properties of (secure) wireless networks
Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures
Reducing radio energy consumption of key management protocols for wireless sensor networks
Proceedings of the 2004 international symposium on Low power electronics and design
Sensor networks: a bridge to the physical world
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Key distribution techniques for sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Localization for mobile sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Revisiting random key pre-distribution schemes for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Connectivity properties of secure wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On Optimal Placement of Intrusion Detection Modules in Sensor Networks
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
Smart dust, friend or foe?: replacing identity with configuration trust
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Secure Comparison of Encrypted Data in Wireless Sensor Networks
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Proceedings of the 4th ACM workshop on Wireless security
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Researches on scheme of pairwise key establishment for distributed sensor networks
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A study of static versus dynamic keying schemes in sensor networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Path key establishment using multiple secured paths in wireless sensor networks
CoNEXT '05 Proceedings of the 2005 ACM conference on Emerging network experiment and technology
A new approach for establishing pairwise keys for securing wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Coordinated sensor deployment for improving secure communications and sensing coverage
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Secure code distribution in dynamically programmable wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
An efficient key establishment scheme for secure aggregating sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
Proceedings of the 4th international conference on Mobile systems, applications and services
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
An Efficient Key Revocation Protocol for Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
An efficient and secure protocol for sensor network time synchronization
Journal of Systems and Software
Location-aware key establishment in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing
Location dependent key management using random key-predistribution in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Visualization assisted detection of sybil attacks in wireless networks
Proceedings of the 3rd international workshop on Visualization for computer security
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Diversify sensor nodes to improve resilience against node compromise
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Location-aware key predistribution scheme for wide area wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Wormhole-Based Antijamming Techniques in Sensor Networks
IEEE Transactions on Mobile Computing
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
JET: dynamic join-exit-tree amortization and scheduling for contributory key management
IEEE/ACM Transactions on Networking (TON)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
A secure alternate path routing in sensor networks
Computer Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
The energy cost of cryptographic key establishment in wireless sensor networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Unleashing public-key cryptography in wireless sensor networks
Journal of Computer Security - On IWAP'05
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
Journal of Computer Security
Secure communications with an asymptotic secrecy model
Knowledge-Based Systems
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
ACM Transactions on Sensor Networks (TOSN)
Key management for long-lived sensor networks in hostile environments
Computer Communications
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
An efficient key distribution scheme for heterogeneous sensor networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
SecLEACH-On the security of clustered sensor networks
Signal Processing
SeGrid: a secure grid framework for sensor networks
EURASIP Journal on Wireless Communications and Networking
EURASIP Journal on Wireless Communications and Networking
Pair-wise path key establishment in wireless sensor networks
Computer Communications
A survey of key management schemes in wireless sensor networks
Computer Communications
SLEDE: lightweight verification of sensor network security protocol implementations
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
SLEDE: lightweight verification of sensor network security protocol implementations
The 6th Joint Meeting on European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering: companion papers
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Securing distributed data storage and retrieval in sensor networks
Pervasive and Mobile Computing
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
Modeling pairwise key establishment for random key predistribution in large-scale sensor networks
IEEE/ACM Transactions on Networking (TON)
ACM Transactions on Information and System Security (TISSEC)
Secure routing based on distributed key sharing in large-scale sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
A role-based access in a hierarchical sensor network architecture to provide multilevel security
Computer Communications
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Defending against false-endorsement-based dos attacks in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Key management and secure software updates in wireless process control environments
WiSec '08 Proceedings of the first ACM conference on Wireless network security
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Proceedings of the 2nd international conference on Ubiquitous information management and communication
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Multilayer key establishment for large-scale sensor networks
International Journal of Security and Networks
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
International Journal of Security and Networks
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
A new group rekeying scheme based on t-packing designs for ad hoc networks
Proceedings of the 2nd international conference on Scalable information systems
TinySA: a security architecture for wireless sensor networks
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
IEEE/ACM Transactions on Networking (TON)
A pairwise key establishment scheme for heterogeneous sensor networks
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
Electronic Notes in Theoretical Computer Science (ENTCS)
A*-based key tree structure generation for group key management in wireless sensor networks
Computer Communications
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Secure Time Synchronization in Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
A recurrent decentralized key management architecture for wireless sensor network
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing
ACM Transactions on Sensor Networks (TOSN)
Efficient path key establishment for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
Maximum supported network coverage area and cost evaluation of key pre-distribution schemes
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
HEAP: A packet authentication scheme for mobile ad hoc networks
Ad Hoc Networks
International Journal of Distributed Sensor Networks
Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks
International Journal of Distributed Sensor Networks - Sensor Networks, Ubiquitous and Trustworthy Computing
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks
Computer Communications
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks
Computational Intelligence and Security
Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
A Key Predistribution Scheme Based on 3-Designs
Information Security and Cryptology
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
SAKE: Software Attestation for Key Establishment in Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Key Refreshing in Wireless Sensor Networks
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Secure Ubiquitous Health Monitoring System
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
Location-based design for secure and efficient wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
An authentication scheme for filtering injected bogus data in sensor networks
Computer Communications
Attack-tolerant localization via iterative verification of locations in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Relaxed authenticity for data aggregation in wireless sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
ARCMA: attack-resilient collaborative message authentication in wireless sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A novel access control protocol for secure sensor networks
Computer Standards & Interfaces
On handling insider attacks in wireless sensor networks
Information Security Tech. Report
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Group-based intrusion detection system in wireless sensor networks
Computer Communications
Energy-efficient relaxed rekeying policies for distributed key management in sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
A Random Key Management Scheme for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Designing Secure Protocols for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
A novel key management algorithm in sensor networks
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
A location-ID sensitive key establishment scheme in static wireless sensor networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
An activity-based sensor networks course for undergraduates with sun spot devices
Proceedings of the 40th ACM technical symposium on Computer science education
ICAIT '08 Proceedings of the 2008 International Conference on Advanced Infocomm Technology
Evolutionary design of secrecy amplification protocols for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Ayushman: a secure, usable pervasive health monitoring system
Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments
A lightweight key renewal scheme for clustered sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Multicast Encryption Infrastructure for Security in Sensor Networks
International Journal of Distributed Sensor Networks
Pervasive and Mobile Computing
A Multipath En-Route Filtering Method for Dropping Reports in Sensor Networks
IEICE - Transactions on Information and Systems
Key Predistribution Schemes for Sensor Networks Using Finite Plane Geometry
IEICE - Transactions on Information and Systems
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
ACM Transactions on Sensor Networks (TOSN)
Information Systems Frontiers
Towards developing a trust-based security solution
Proceedings of the 2009 ACM symposium on Applied Computing
An Improved Distributed Key Management Scheme in Wireless Sensor Networks
Information Security Applications
Secure multidimensional range queries in sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
A key management protocol with robust continuity for sensor networks
Computer Standards & Interfaces
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Privacy-aware routing in sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network
Journal of Network and Computer Applications
Key Predistribution Schemes Using Codes in Wireless Sensor Networks
Information Security and Cryptology
Comments on “Distributed symmetric key management for mobile ad hoc networks”
Information Processing Letters
Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies
International Journal of Distributed Sensor Networks
Distributed data source verification in wireless sensor networks
Information Fusion
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
RTKPS: A Key Pre-distribution Scheme Based on Rooted-Tree in Wireless Sensor and Actor Network
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part III
Secure group communication in wireless mesh networks
Ad Hoc Networks
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Random sampling key revocation scheme for distributed sensor networks
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Dynamic trust establishment in emergency ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A key pre-distribution scheme for heterogeneous sensor networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
On providing sink anonymity for sensor networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
LoBa128, a Lorenz-based PRNG for wireless sensor networks
International Journal of Communication Networks and Distributed Systems
A flexible and efficient key distribution scheme for renewable wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Effective pair-wise key establishment scheme for wireless sensor networks
Proceedings of the 2nd international conference on Security of information and networks
An authentication scheme for locating compromised sensor nodes in WSNs
Journal of Network and Computer Applications
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
In situ key establishment in large-scale sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
On providing location privacy for mobile sinks in wireless sensor networks
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Distributed key management for wireless sensor networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
SCON: Secure management of continuity in sensor networks
Computer Communications
A lightweight secure protocol for wireless sensor networks
Computer Communications
Secret instantiation in ad-hoc networks
Computer Communications
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
GeoSENS: geo-based sensor network secure communication protocol
Computer Communications
IEEE Transactions on Information Forensics and Security
TIMAR: an efficient key management scheme for ubiquitous health care environments
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
Proceedings of the 16th ACM conference on Computer and communications security
ACM Transactions on Sensor Networks (TOSN)
Identity-based secure protocol scheme for wireless sensor network
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A multivariate key-establishment scheme for wireless sensor networks
IEEE Transactions on Wireless Communications
Key establishment schemes against storage-bounded adversaries in wireless sensor networks
IEEE Transactions on Wireless Communications
IEEE Transactions on Wireless Communications
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
Random key pre-distribution with transitory master key for wireless sensor networks
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
DoS detection in cluster-based sensor networks
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
ASGrid: autonomic management of hybrid sensor grid systems and applications
International Journal of Sensor Networks
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
A simple non-interactive pairwise key establishment scheme in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
An efficient authentication and key management protocol for hierarchical ad hoc sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
On attack-resilient wireless sensor networks with novel recovery strategies
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
FKM: a fingerprint-based key management protocol for SoC-based sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Dealing with random and selective attacks in wireless sensor systems
ACM Transactions on Sensor Networks (TOSN)
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
International Journal of Security and Networks
FGIT '09 Proceedings of the 1st International Conference on Future Generation Information Technology
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Simulation modeling of secure wireless sensor networks
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
Enhanced group-based key management scheme for wireless sensor networks using deployment knowledge
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Connectivity results for random key graphs
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Design of robust and secure encryption scheme for WSN using PKI (LWT-PKI)
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Smart Dust Security -- Key Infection Revisited
Electronic Notes in Theoretical Computer Science (ENTCS)
Research on biological immunity principle based security model for wireless sensor network
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Node capture attack impact on key management schemes for heterogeneous wireless sensor networks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Resisting node spoofing attacks in random key predistribution schemes: a uniform design
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Location-based pairwise key predistribution for wireless sensor networks
IEEE Transactions on Wireless Communications
ID-based key management strategies of clustering wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A strategy of node membership verification for wireless multimedia sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Distributed node authentication in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hypercube-based key management in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hiberarchy cluster model and key management in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A security architecture for wireless sensor networks based-on public key cryptography
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Key establishment for layered group-based Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
REP: Location Privacy for VANETs Using Random Encryption Periods
Mobile Networks and Applications
Connectivity properties of large-scale sensor networks
Wireless Networks
Tree-based key predistribution for wireless sensor networks
Wireless Networks
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
Polynomial based scheme (PBS) for establishing Authentic Associations in Wireless Mesh Networks
Journal of Parallel and Distributed Computing
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Pervasive and Mobile Computing
Securing wireless sensor networks against large-scale node capture attacks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
MKPS: a multi-level key pre-distribution scheme for secure wireless sensor networks
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction platforms and techniques
Secure data aggregation with multiple encryption
EWSN'07 Proceedings of the 4th European conference on Wireless sensor networks
A time-based key management protocol for wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Lightweight anomaly intrusion detection in wireless sensor networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
A practical inter-sensor broadcast authentication scheme
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Efficient and distributed access control for sensor networks
DCOSS'07 Proceedings of the 3rd IEEE international conference on Distributed computing in sensor systems
An energy and communication efficient group key in sensor networks using elliptic curve polynomial
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
The subset keys and identity tickets (SKIT) key distribution scheme
IEEE Transactions on Information Forensics and Security
Key predistribution schemes for sensor networks for continuous deployment scenario
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Using auxiliary sensors for pairwise key establishment in WSN
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks
Proceedings of the 2010 ACM Symposium on Applied Computing
A key predistribution scheme for wireless sensor networks using the small-world concept
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
Genetic algorithm based routing method for efficient data transmission in sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Forward-secure key evolution in wireless sensor networks
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Anonymity in the wild: mixes on unstructured networks
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
On grid-based key pre-distribution: toward a better connectivity in wireless sensor network
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
A hierarchical composition of LU matrix-based key distribution scheme for sensor networks
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Attack-resilient random key distribution scheme for distributed sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A loop-based key management scheme for wireless sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Two approaches on pairwise key path establishment for sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Multigrid based key predistribution scheme in ad hoc networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
LBKERS: a new efficient key management scheme for wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Structures for communication-efficient public key revocation in ubiquitous sensor network
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A method of pair-wise key distribution and management in distributed wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
An improved key management scheme for heterogeneity wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A key establishment scheme for large-scale mobile wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Key establishment in heterogeneous self-organized networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Enabling full-size public-key algorithms on 8-bit sensor nodes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
Network coding protocols for secret key distribution
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
A new key-predistribution scheme for highly mobile sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
Using learned data patterns to detect malicious nodes in sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
An efficient key establishment scheme for self-organizing sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Steel, cast iron and concrete: security engineering for real world wireless sensor networks
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
On securing perimeter coverage in wireless sensor networks
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
A lightweight key establishment scheme for wireless sensor networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
On the existence of triangles in random key graphs
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Securing random key predistribution against semi-honest adversaries
INSS'09 Proceedings of the 6th international conference on Networked sensing systems
On the evolution of adversary models in security protocols: or know your friend and foe alike
Proceedings of the 13th international conference on Security protocols
A secure communication scheme for mobile wireless sensor networks using hamming distance
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
TLKMS: a dynamic keys management scheme for large-scale wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
N-dimensional grid-based key predistribution in wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
A lightweight secure architecture for wireless sensor networks
International Journal of Internet Technology and Secured Transactions
Distributed hierarchical key management scheme in mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
CAT: building couples to early detect node compromise attack in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
MAAC: message authentication acceleration protocol for vehicular ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Tame pool-based pairwise key predistribution for large-scale sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
An efficient post-deployment key establishment scheme for heterogeneous sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Multi-path key establishment against REM attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Framework design and performance analysis on pairwise key establishment
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
Private key agreement and secure communication for heterogeneous sensor networks
Journal of Parallel and Distributed Computing
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Protecting location privacy in large-scale wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Dynamic resiliency analysis of key predistribution in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A survey of key predistribution schemes for key management in wireless sensor networks
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes
ACM Transactions on Sensor Networks (TOSN)
Mobile Networks and Applications
A new key management scheme in heterogeneous wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Key re-dissemination for maintaining detection power in sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A new scheme of key distribution using implicit security in wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
From time domain to space domain: detecting replica attacks in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
Group-based key management for mobile sensor networks
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Host-oblivious security for content-based networks
Proceedings of the 5th International Conference on Future Internet Technologies
Journal of Intelligent Manufacturing
Distinct difference configurations: multihop paths and key predistribution in sensor networks
IEEE Transactions on Information Theory
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
The Internet of Things: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining
Proceedings of the 17th ACM conference on Computer and communications security
A secure pervasive health care system using location dependent unicast key generation scheme
PIKM '10 Proceedings of the 3rd workshop on Ph.D. students in information and knowledge management
Efficient and distributed access control for sensor networks
Wireless Networks
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Secure multi-agent system for multi-hop environments
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Scalable link-layer key agreement in sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
On the performance of a distributed key management scheme in heterogeneous wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A security framework for privacy-preserving data aggregation in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
From key predistribution to key redistribution
ALGOSENSORS'10 Proceedings of the 6th international conference on Algorithms for sensor systems, wireless adhoc networks, and autonomous mobile entities
EURASIP Journal on Wireless Communications and Networking
Tree based protocol for key management in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
GPS calibrated ad-hoc localization for geosocial networking
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
A decentralized approach to secure management of nodes in distributed sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Key pre-distribution using partially balanced designs in wireless sensor networks
International Journal of High Performance Computing and Networking
International Journal of Sensor Networks
Distributed KDC-based random pairwise key establishment in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
Component Evolution in General Random Intersection Graphs
SIAM Journal on Discrete Mathematics
A forward authentication key management scheme for heterogeneous sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
The rise and fall and rise of combinatorial key predistribution
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Secure mobile subscription of sensor-encrypted data
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
A generic evaluation method for key management schemes in wireless sensor network
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
On the development of adaptive and self-dependent secure routing for wireless sensor networks
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Efficient pairwise key establishment scheme for sensor networks
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
REBIVE: a reliable private data aggregation scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Applied Computing
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
A high performance and intrinsically secure key establishment protocol for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of Sensor Networks
PDA: Privacy-Preserving Data Aggregation for Information Collection
ACM Transactions on Sensor Networks (TOSN)
PERSEN: power-efficient logical ring based key management for clustered sensor networks
International Journal of Sensor Networks
An improved key establishment scheme for wireless sensor network
Proceedings of the 6th International Conference on Future Internet Technologies
Pairwise key establishment scheme for hypercube-based wireless sensor networks
Proceedings of the 15th WSEAS international conference on Computers
A secure privacy preserved data aggregation scheme in non hierarchical networks
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
KALwEN+: practical key management schemes for gossip-based wireless medical sensor networks
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Determining parameters of key predistribution schemes via linear codes in wireless sensor networks
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Geometric graphs with randomly deleted edges - connectivity and routing protocols
MFCS'11 Proceedings of the 36th international conference on Mathematical foundations of computer science
Preserving privacy in wireless sensor networks using reliable data aggregation
ACM SIGAPP Applied Computing Review
Challenges in secure sensor-cloud computing
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Centralized Key Management Scheme in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Rescuing wireless sensor networks security from science fiction
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
On the price of security in large-scale wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
A secure key management framework for heterogeneous wireless sensor networks
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
POLISH: proactive co-operative link self-healing for wireless sensor networks
SSS'11 Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems
A key management method based on an AVL tree and ECC cryptography for wireless sensor networks
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
Diverging keys in wireless sensor networks
ISC'06 Proceedings of the 9th international conference on Information Security
Product construction of key distribution schemes for sensor networks
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Deterministic key predistribution schemes for distributed sensor networks
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Applying key infrastructures for sensor networks in CIP/CIIP scenarios
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
A new scheme for establishing pairwise keys for wireless sensor networks
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
Achieving distributed user access control in sensor networks
Ad Hoc Networks
A key management scheme for large scale distributed sensor networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Key management in sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
An efficient ID-Based bilinear key predistribution scheme for distributed sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Pairwise key setup and authentication utilizing deployment information for secure sensor network
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
An optimizing authenticated key exchange protocol for self-organizing sensor networks
UCS'06 Proceedings of the Third international conference on Ubiquitous Computing Systems
Body sensor network key distribution using human interactive channels
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Secure rejoining scheme for dynamic sensor networks
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A secure key agreement scheme in low-energy wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
A space-efficient algorithm for pre-distributing pairwise keys in sensor networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part III
Clique size in sensor networks with key pre-distribution based on transversal design
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
Key forwarding: a location-adaptive key-establishment scheme for wireless sensor networks
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
A key management scheme for cross-layering designs in wireless sensor networks
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Hybrid authentication and key management scheme for WSANs
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Storage-Optimal key sharing with authentication in sensor networks
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Distributed user access control in sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Locating compromised sensor nodes through incremental hashing authentication
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
A noble key pre-distribution scheme with LU matrix for secure wireless sensor networks
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
SKiMPy: a simple key management protocol for MANETs in emergency and rescue operations
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Authenticated queries in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
One-Time sensors: a novel concept to mitigate node-capture attacks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Randomized grid based scheme for wireless sensor network
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A half-key key management scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
Information Sciences: an International Journal
Radio networks with reliable communication
COCOON'05 Proceedings of the 11th annual international conference on Computing and Combinatorics
SeGrid: a secure grid infrastructure for sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Using MDS codes for the key establishment of wireless sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Two-Step hierarchical protocols for establishing session keys in wireless sensor networks
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
An efficient key pre-distribution scheme for secure distributed sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Flexible deployment models for location-aware key management in wireless sensor networks
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Hierarchical hypercube-based pairwise key establishment schemes for sensor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Key establishment between heterogenous nodes in wireless sensor and actor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Behavior-Based trust in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Key establishment and authentication mechanism for secure sensor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Security of emergent properties in ad-hoc networks (transcript of discussion)
SP'04 Proceedings of the 12th international conference on Security Protocols
Message and its origin authentication protocol for data aggregation in sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
On building a lightweight security architecture for sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A further approach on hypercube-based pairwise key establishment in sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Key predistribution in sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A strong key pre-distribution scheme for wireless sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Cooperative public key authentication protocol in wireless sensor network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Research on pairwise key establishment model and algorithm for sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Utilizing secure three hop links to agree pairwise keys in wireless sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A secure routing protocol for wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Efficient pairwise key establishment scheme based on random pre-distribution keys in WSN
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
A light-weighted misused key detection in wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
PKM: a pairwise key management scheme for wireless sensor networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Security problems of systems of extremely weak devices
Annales UMCS, Informatica - Security Systems
Safe RFID system modeling using shared key pool in ubiquitous environments
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Towards enhanced key management in multi-phase ZigBee network architecture
Computer Communications
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
On the security of wireless sensor networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design
ISC'05 Proceedings of the 8th international conference on Information Security
Exploring message authentication in sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
A security architecture for mobile wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks
Mobile Networks and Applications
Review: Multi-agent systems for protecting critical infrastructures: A survey
Journal of Network and Computer Applications
Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
A key management scheme for commodity sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Secure overlays: making static key distribution schemes work with mobile base stations in WSNs
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
Security in wireless sensor networks: considerations and experiments
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
A novel pairwise key predistribution scheme for ubiquitous sensor network
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Key management for mobile sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
ARMS: an authenticated routing message in sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Combinatorial structures for design of wireless sensor networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Location-Aware key management using multi-layer grids for wireless sensor networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Securing communication trees in sensor networks
ALGOSENSORS'06 Proceedings of the Second international conference on Algorithmic Aspects of Wireless Sensor Networks
A key management scheme with encoding and improved security for wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
On optimality of key pre-distribution schemes for distributed sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Manipulation as a security mechanism in sensor networks
SBP'10 Proceedings of the Third international conference on Social Computing, Behavioral Modeling, and Prediction
Node capture games: a game theoretic approach to modeling and mitigating node capture attacks
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
A key reshuffling scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
A hybrid design of key pre-distribution scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
A game based model of security for key predistribution schemes in wireless sensor network
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
User revocation in secure adhoc networks
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Autonomic communication security in sensor networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
EWSN'06 Proceedings of the Third European conference on Wireless Sensor Networks
Tree-Based key distribution patterns
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Forward secure communication in wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Wireless sensor replica detection in mobile environments
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Quorum-based key management scheme in wireless sensor networks
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Foisting and stealing of keys in sensor networks
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
A novel key management scheme for wireless embedded systems
ACM SIGAPP Applied Computing Review
Framework for key management scheme in heterogeneous wireless sensor networks
iUBICOM'10 Proceedings of the 5th international conference on Ubiquitous and Collaborative Computing
VoCS'08 Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
Expansion properties of (secure) wireless networks
ACM Transactions on Algorithms (TALG)
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
Security and Communication Networks
Lightweight integrity for XOR network coding in wireless sensor networks
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Evolutionary design of message efficient secrecy amplification protocols
EuroGP'12 Proceedings of the 15th European conference on Genetic Programming
On the complexity of the herding attack and some related attacks on hash functions
Designs, Codes and Cryptography
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
Survey Secure and reliable clustering in wireless sensor networks: A critical survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Sybil attack detection through global topology pattern visualization
Information Visualization
Performance analysis of deterministic key allocation schemes for wireless sensor networks
International Journal of Wireless and Mobile Computing
Mobile Networks and Applications
International Journal of Internet Technology and Secured Transactions
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
An attack on privacy preserving data aggregation protocol for wireless sensor networks
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
From key predistribution to key redistribution
Theoretical Computer Science
Hexagonal groups based key management using deployment knowledge in wireless sensor networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
ACM Transactions on Embedded Computing Systems (TECS)
On the optimal allocation of adversarial resources
Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
Efficient data aggregation with in-network integrity control for WSN
Journal of Parallel and Distributed Computing
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An improved ID-Based key management scheme in wireless sensor network
ICSI'12 Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part II
Journal of Computer and System Sciences
Self-healing in unattended wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Improving data quality using a cross layer protocol in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
Proceedings of the CUBE International Information Technology Conference
Revoke and let live: a secure key revocation api for cryptographic devices
Proceedings of the 2012 ACM conference on Computer and communications security
Security and privacy issues for the network of the future
Security and Communication Networks
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Secret key revocation in sensor networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
A secure pairwise key establishment scheme in wireless ad hoc networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
A key revocation scheme for mobile sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Key predistribution using partially balanced designs in wireless sensor networks
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching
International Journal of Security and Networks
A survivability model in wireless sensor networks
Computers & Mathematics with Applications
An effective secure routing for false data injection attack in wireless sensor network
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
On the role of expander graphs in key predistribution schemes for wireless sensor networks
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
ISC'12 Proceedings of the 15th international conference on Information Security
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks
Journal of Parallel and Distributed Computing
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
A new class of Hash-Chain based key pre-distribution schemes for WSN
Computer Communications
Key predistribution schemes for distributed sensor networks via block designs
Designs, Codes and Cryptography
Mobile node authentication using key distribution scheme in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
A hash chains based key management scheme for wireless sensor networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
ESF: an efficient security framework for wireless sensor network
International Journal of Communication Networks and Distributed Systems
International Journal of Systems and Service-Oriented Engineering
Providing DoS resistance for signature-based broadcast authentication in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Information Sciences: an International Journal
Review: Dynamic key management in wireless sensor networks: A survey
Journal of Network and Computer Applications
Code based KPD scheme with full connectivity: deterministic merging
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
6LoWPAN fragmentation attacks and mitigation mechanisms
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Energy attacks and defense techniques for wireless systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Proceedings of the second ACM MobiHoc workshop on Airborne networks and communications
Cooperative security in distributed networks
Computer Communications
Energy-efficient and secure in-network storage and retrieval for WSNs: an adaptive approach
The Journal of Supercomputing
Key establishment protocols for secure communication in clustered sensor networks
International Journal of Communication Networks and Distributed Systems
Lightweight secure communication protocols for in-vehicle sensor networks
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer
Proceedings of the International Workshop on Adaptive Security
Expert key selection impact on the MANETs' performance using probabilistic key management algorithm
Proceedings of the 6th International Conference on Security of Information and Networks
DARE: evaluating Data Accuracy using node REputation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Compression in wireless sensor networks: A survey and comparative evaluation
ACM Transactions on Sensor Networks (TOSN)
Large scale wireless sensor networks with multi-level dynamic key management scheme
Journal of Systems Architecture: the EUROMICRO Journal
BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach
The Journal of Supercomputing
Matrix-based pairwise key establishment for wireless mesh networks
Future Generation Computer Systems
Journal of Computer and System Sciences
Clone wars: Distributed detection of clone attacks in mobile WSNs
Journal of Computer and System Sciences
Cooperative secret delivery in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
On the node clone detection in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Autonomous Shared Key Management Scheme for Space Networks
Wireless Personal Communications: An International Journal
On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol
Wireless Personal Communications: An International Journal
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
Information Sciences: an International Journal
Hi-index | 0.07 |
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and communication capabilities. DSNs are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to grow the network or replace failing and unreliable nodes. DSNs may be deployed in hostile areas where communication is monitored and nodes are subject to capture and surreptitious use by an adversary. Hence DSNs require cryptographic protection of communications, sensor-capture detection, key revocation and sensor disabling. In this paper, we present a key-management scheme designed to satisfy both operational and security requirements of DSNs. The scheme includes selective distribution and revocation of keys to sensor nodes as well as node re-keying without substantial computation and communication capabilities. It relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes. The security and network connectivity characteristics supported by the key-management scheme are discussed and simulation experiments presented.