An evaluation of directory schemes for cache coherence
ISCA '88 Proceedings of the 15th Annual International Symposium on Computer architecture
On key distribution and authentication in mobile radio networks
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure communications over insecure channels
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Long-Lived Broadcast Encryption
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Key Distribution Protocol for Digital Mobile Communication Systems
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
The Strange Logic of Random Graphs
The Strange Logic of Random Graphs
IEEE Network: The Magazine of Global Internetworking
Security and privacy issues of handheld and wearable wireless devices
Communications of the ACM - Why CS students need math
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Robust key establishment in sensor networks
ACM SIGMOD Record
Scalable Cryptographic Key Management in Wireless Sensor Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Reducing radio energy consumption of key management protocols for wireless sensor networks
Proceedings of the 2004 international symposium on Low power electronics and design
Key distribution techniques for sensor networks
Wireless sensor networks
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Localization for mobile sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Revisiting random key pre-distribution schemes for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Connectivity properties of secure wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
The Implications of Pervasive Computing on Network Design
BT Technology Journal
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
On Optimal Placement of Intrusion Detection Modules in Sensor Networks
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
Smart dust, friend or foe?: replacing identity with configuration trust
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Secure Comparison of Encrypted Data in Wireless Sensor Networks
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
A ZKP-based identification scheme for base nodes in wireless sensor networks
Proceedings of the 2005 ACM symposium on Applied computing
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Proceedings of the 4th ACM workshop on Wireless security
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Researches on scheme of pairwise key establishment for distributed sensor networks
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A study of static versus dynamic keying schemes in sensor networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks
IEEE Transactions on Dependable and Secure Computing
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Path key establishment using multiple secured paths in wireless sensor networks
CoNEXT '05 Proceedings of the 2005 ACM conference on Emerging network experiment and technology
A new approach for establishing pairwise keys for securing wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Coordinated sensor deployment for improving secure communications and sensing coverage
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Self-organised group key management for ad hoc networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
An efficient key establishment scheme for secure aggregating sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
Proceedings of the 4th international conference on Mobile systems, applications and services
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Location-aware key establishment in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
ACM SIGOPS Operating Systems Review
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
Location dependent key management using random key-predistribution in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Visualization assisted detection of sybil attacks in wireless networks
Proceedings of the 3rd international workshop on Visualization for computer security
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Diversify sensor nodes to improve resilience against node compromise
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Location-aware key predistribution scheme for wide area wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
A secure alternate path routing in sensor networks
Computer Communications
ANSWER: AutoNomouS netWorked sEnsoR system
Journal of Parallel and Distributed Computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Unleashing public-key cryptography in wireless sensor networks
Journal of Computer Security - On IWAP'05
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
Journal of Computer Security
Secure communications with an asymptotic secrecy model
Knowledge-Based Systems
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
ACM Transactions on Sensor Networks (TOSN)
Key management for long-lived sensor networks in hostile environments
Computer Communications
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
An efficient key distribution scheme for heterogeneous sensor networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
SecLEACH-On the security of clustered sensor networks
Signal Processing
SeGrid: a secure grid framework for sensor networks
EURASIP Journal on Wireless Communications and Networking
EURASIP Journal on Wireless Communications and Networking
Pair-wise path key establishment in wireless sensor networks
Computer Communications
A survey of key management schemes in wireless sensor networks
Computer Communications
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
Modeling pairwise key establishment for random key predistribution in large-scale sensor networks
IEEE/ACM Transactions on Networking (TON)
ACM Transactions on Information and System Security (TISSEC)
Secure routing based on distributed key sharing in large-scale sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Defending against false-endorsement-based dos attacks in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Comparison of innovative signature algorithms for WSNs
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Proceedings of the 2nd international conference on Ubiquitous information management and communication
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
International Journal of Sensor Networks
Reliable data delivery in wireless sensor networks using distributed cluster monitoring
International Journal of Sensor Networks
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
International Journal of Security and Networks
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Energy-efficient distributed authorisation server (DAS) placement for sensor networks
International Journal of High Performance Computing and Networking
A new group rekeying scheme based on t-packing designs for ad hoc networks
Proceedings of the 2nd international conference on Scalable information systems
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
A pairwise key establishment scheme for heterogeneous sensor networks
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
Public key based authentication for secure integration of sensor data and RFID
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
Electronic Notes in Theoretical Computer Science (ENTCS)
A*-based key tree structure generation for group key management in wireless sensor networks
Computer Communications
Attack-Resistant Location Estimation in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Secure Time Synchronization in Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
ACM Transactions on Sensor Networks (TOSN)
Efficient path key establishment for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
Attack distribution modeling and its applications in sensor network security
EURASIP Journal on Wireless Communications and Networking
Maximum supported network coverage area and cost evaluation of key pre-distribution schemes
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Robust range-free localization in wireless sensor networks
Mobile Networks and Applications
Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks
International Journal of Distributed Sensor Networks - Sensor Networks, Ubiquitous and Trustworthy Computing
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks
Computer Communications
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks
Computational Intelligence and Security
Group-Based Key Management for Multicast of Ad Hoc Sensor Network
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
A Key Predistribution Scheme Based on 3-Designs
Information Security and Cryptology
SAKE: Software Attestation for Key Establishment in Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Secure Ubiquitous Health Monitoring System
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
Location-based design for secure and efficient wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
Efficient security primitives derived from a secure aggregation algorithm
Proceedings of the 15th ACM conference on Computer and communications security
An authentication scheme for filtering injected bogus data in sensor networks
Computer Communications
Attack-tolerant localization via iterative verification of locations in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A novel access control protocol for secure sensor networks
Computer Standards & Interfaces
A unified security framework with three key management schemes for wireless sensor networks
Computer Communications
Group-based intrusion detection system in wireless sensor networks
Computer Communications
A Random Key Management Scheme for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
A Secure Message Percolation Scheme for Wireless Sensor Network
Information Networking. Towards Ubiquitous Networking and Services
Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks
Information Networking. Towards Ubiquitous Networking and Services
A novel key management algorithm in sensor networks
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
Evolutionary design of secrecy amplification protocols for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
A lightweight key renewal scheme for clustered sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Reporter node determination of replicated node detection in wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
Multicast Encryption Infrastructure for Security in Sensor Networks
International Journal of Distributed Sensor Networks
Pervasive and Mobile Computing
Key Predistribution Schemes for Sensor Networks Using Finite Plane Geometry
IEICE - Transactions on Information and Systems
ACM Transactions on Sensor Networks (TOSN)
Information Systems Frontiers
Towards developing a trust-based security solution
Proceedings of the 2009 ACM symposium on Applied Computing
An Improved Distributed Key Management Scheme in Wireless Sensor Networks
Information Security Applications
Secure multidimensional range queries in sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
A key management protocol with robust continuity for sensor networks
Computer Standards & Interfaces
Wireless image sensor networks: event acquisition in attack-prone and uncertain environments
Multidimensional Systems and Signal Processing
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network
Journal of Network and Computer Applications
Key Predistribution Schemes Using Codes in Wireless Sensor Networks
Information Security and Cryptology
Comments on “Distributed symmetric key management for mobile ad hoc networks”
Information Processing Letters
Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies
International Journal of Distributed Sensor Networks
Proceedings of the 4th Annual International Conference on Wireless Internet
Distributed data source verification in wireless sensor networks
Information Fusion
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
RTKPS: A Key Pre-distribution Scheme Based on Rooted-Tree in Wireless Sensor and Actor Network
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part III
Secure group communication in wireless mesh networks
Ad Hoc Networks
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
On the robustness of range-free localization in wireless sensor networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Random sampling key revocation scheme for distributed sensor networks
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
A key pre-distribution scheme for heterogeneous sensor networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Effective pair-wise key establishment scheme for wireless sensor networks
Proceedings of the 2nd international conference on Security of information and networks
Secure many to many routing for wireless sensor and actuator networks
Proceedings of the 2nd international conference on Security of information and networks
An authentication scheme for locating compromised sensor nodes in WSNs
Journal of Network and Computer Applications
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
In situ key establishment in large-scale sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Distributed key management for wireless sensor networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
SCON: Secure management of continuity in sensor networks
Computer Communications
A lightweight secure protocol for wireless sensor networks
Computer Communications
Secret instantiation in ad-hoc networks
Computer Communications
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
GeoSENS: geo-based sensor network secure communication protocol
Computer Communications
Multi-neighbor random key pre-distribution: a probabilistic analysis
IEEE Communications Letters
IEEE Transactions on Information Forensics and Security
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
TIMAR: an efficient key management scheme for ubiquitous health care environments
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
Proceedings of the 16th ACM conference on Computer and communications security
ACM Transactions on Sensor Networks (TOSN)
A multivariate key-establishment scheme for wireless sensor networks
IEEE Transactions on Wireless Communications
IEEE Transactions on Wireless Communications
Key establishment schemes against storage-bounded adversaries in wireless sensor networks
IEEE Transactions on Wireless Communications
IEEE Transactions on Wireless Communications
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
ASGrid: autonomic management of hybrid sensor grid systems and applications
International Journal of Sensor Networks
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
A simple non-interactive pairwise key establishment scheme in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
An efficient authentication and key management protocol for hierarchical ad hoc sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
On attack-resilient wireless sensor networks with novel recovery strategies
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
FKM: a fingerprint-based key management protocol for SoC-based sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Dealing with random and selective attacks in wireless sensor systems
ACM Transactions on Sensor Networks (TOSN)
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Simulation modeling of secure wireless sensor networks
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
Enhanced group-based key management scheme for wireless sensor networks using deployment knowledge
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Design of robust and secure encryption scheme for WSN using PKI (LWT-PKI)
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Smart Dust Security -- Key Infection Revisited
Electronic Notes in Theoretical Computer Science (ENTCS)
Research on biological immunity principle based security model for wireless sensor network
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Resisting node spoofing attacks in random key predistribution schemes: a uniform design
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Location-based pairwise key predistribution for wireless sensor networks
IEEE Transactions on Wireless Communications
ID-based key management strategies of clustering wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A strategy of node membership verification for wireless multimedia sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Distributed node authentication in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hypercube-based key management in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Tolerant majority-colluding attacks for secure localization in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hiberarchy cluster model and key management in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A security architecture for wireless sensor networks based-on public key cryptography
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Key establishment for layered group-based Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
Mobility and cooperation to thwart node capture attacks in MANETs
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
REP: Location Privacy for VANETs Using Random Encryption Periods
Mobile Networks and Applications
Connectivity properties of large-scale sensor networks
Wireless Networks
Tree-based key predistribution for wireless sensor networks
Wireless Networks
Polynomial based scheme (PBS) for establishing Authentic Associations in Wireless Mesh Networks
Journal of Parallel and Distributed Computing
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
Securing wireless sensor networks against large-scale node capture attacks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
MKPS: a multi-level key pre-distribution scheme for secure wireless sensor networks
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction platforms and techniques
A time-based key management protocol for wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A new resilient key management protocol for wireless sensor networks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Efficient user authentication and key agreement in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A practical inter-sensor broadcast authentication scheme
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Efficient and distributed access control for sensor networks
DCOSS'07 Proceedings of the 3rd IEEE international conference on Distributed computing in sensor systems
The subset keys and identity tickets (SKIT) key distribution scheme
IEEE Transactions on Information Forensics and Security
Key predistribution schemes for sensor networks for continuous deployment scenario
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Using auxiliary sensors for pairwise key establishment in WSN
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
A key predistribution scheme for wireless sensor networks using the small-world concept
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
Forward-secure key evolution in wireless sensor networks
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
A secure time synchronization protocol for sensor network
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
On grid-based key pre-distribution: toward a better connectivity in wireless sensor network
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
A hierarchical composition of LU matrix-based key distribution scheme for sensor networks
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Attack-resilient random key distribution scheme for distributed sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A loop-based key management scheme for wireless sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Two approaches on pairwise key path establishment for sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Multigrid based key predistribution scheme in ad hoc networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
LBKERS: a new efficient key management scheme for wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
SAPC: a secure aggregation protocol for cluster-based wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Structures for communication-efficient public key revocation in ubiquitous sensor network
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A method of pair-wise key distribution and management in distributed wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
An improved key management scheme for heterogeneity wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A key establishment scheme for large-scale mobile wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Key establishment in heterogeneous self-organized networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Enabling full-size public-key algorithms on 8-bit sensor nodes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
A new key-predistribution scheme for highly mobile sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
An efficient key establishment scheme for self-organizing sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
A lightweight key establishment scheme for wireless sensor networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Robust uncorrelated bit extraction methodologies for wireless sensors
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
A secure communication scheme for mobile wireless sensor networks using hamming distance
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
TLKMS: a dynamic keys management scheme for large-scale wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
N-dimensional grid-based key predistribution in wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
A lightweight secure architecture for wireless sensor networks
International Journal of Internet Technology and Secured Transactions
MAAC: message authentication acceleration protocol for vehicular ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Tame pool-based pairwise key predistribution for large-scale sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
On the connectivity of key-distribution strategies in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure communication among cell phones and sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Multi-path key establishment against REM attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Framework design and performance analysis on pairwise key establishment
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
Private key agreement and secure communication for heterogeneous sensor networks
Journal of Parallel and Distributed Computing
Dynamic resiliency analysis of key predistribution in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A survey of key predistribution schemes for key management in wireless sensor networks
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Random-walk based approach to detect clone attacks in wireless sensor networks
IEEE Journal on Selected Areas in Communications
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes
ACM Transactions on Sensor Networks (TOSN)
Statistical anomaly detection with sensor networks
ACM Transactions on Sensor Networks (TOSN)
Mobile Networks and Applications
A new key management scheme in heterogeneous wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Key establishment protocols using environmental and physiological data in wireless sensor networks
International Journal of Sensor Networks
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Group-based key management for mobile sensor networks
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Host-oblivious security for content-based networks
Proceedings of the 5th International Conference on Future Internet Technologies
Secure multi-path data deliver in sensor networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Journal of Intelligent Manufacturing
Distinct difference configurations: multihop paths and key predistribution in sensor networks
IEEE Transactions on Information Theory
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining
Proceedings of the 17th ACM conference on Computer and communications security
Efficient sensor node authentication via 3GPP mobile communication networks
Proceedings of the 17th ACM conference on Computer and communications security
A secure pervasive health care system using location dependent unicast key generation scheme
PIKM '10 Proceedings of the 3rd workshop on Ph.D. students in information and knowledge management
Efficient and distributed access control for sensor networks
Wireless Networks
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Scalable link-layer key agreement in sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
On the performance of a distributed key management scheme in heterogeneous wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Location verification using communication range variation for wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
From key predistribution to key redistribution
ALGOSENSORS'10 Proceedings of the 6th international conference on Algorithms for sensor systems, wireless adhoc networks, and autonomous mobile entities
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
A lightweight group-key management protocol for secure ad-hoc-network routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Compromise-resilient anti-jamming for wireless sensor networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Key pre-distribution using partially balanced designs in wireless sensor networks
International Journal of High Performance Computing and Networking
International Journal of Sensor Networks
Distributed KDC-based random pairwise key establishment in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
A forward authentication key management scheme for heterogeneous sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure mobile subscription of sensor-encrypted data
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Optimal message transmission protocols with flexible parameters
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
A generic evaluation method for key management schemes in wireless sensor network
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Efficient pairwise key establishment scheme for sensor networks
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
WRL: a wormhole-resistent localization scheme based on DV-hop for wireless sensor networks
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
A novel group key agreement protocol for wireless mesh network
Computers and Electrical Engineering
A high performance and intrinsically secure key establishment protocol for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of Sensor Networks
PERSEN: power-efficient logical ring based key management for clustered sensor networks
International Journal of Sensor Networks
Pairwise key establishment scheme for hypercube-based wireless sensor networks
Proceedings of the 15th WSEAS international conference on Computers
Determining parameters of key predistribution schemes via linear codes in wireless sensor networks
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Geometric graphs with randomly deleted edges - connectivity and routing protocols
MFCS'11 Proceedings of the 36th international conference on Mathematical foundations of computer science
Centralized Key Management Scheme in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
On the price of security in large-scale wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Security Challenges in the IP-based Internet of Things
Wireless Personal Communications: An International Journal
Diverging keys in wireless sensor networks
ISC'06 Proceedings of the 9th international conference on Information Security
Product construction of key distribution schemes for sensor networks
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Deterministic key predistribution schemes for distributed sensor networks
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Applying key infrastructures for sensor networks in CIP/CIIP scenarios
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
A new scheme for establishing pairwise keys for wireless sensor networks
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
Achieving distributed user access control in sensor networks
Ad Hoc Networks
A key management scheme for large scale distributed sensor networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Key management in sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
The effective radius model for multi-hop wireless networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
An efficient ID-Based bilinear key predistribution scheme for distributed sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Pairwise key setup and authentication utilizing deployment information for secure sensor network
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Body sensor network key distribution using human interactive channels
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Secure rejoining scheme for dynamic sensor networks
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A secure key agreement scheme in low-energy wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
A space-efficient algorithm for pre-distributing pairwise keys in sensor networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part III
Key forwarding: a location-adaptive key-establishment scheme for wireless sensor networks
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
A key management scheme for cross-layering designs in wireless sensor networks
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Hybrid authentication and key management scheme for WSANs
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Storage-Optimal key sharing with authentication in sensor networks
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Distributed user access control in sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Locating compromised sensor nodes through incremental hashing authentication
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
A noble key pre-distribution scheme with LU matrix for secure wireless sensor networks
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
One-Time sensors: a novel concept to mitigate node-capture attacks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Randomized grid based scheme for wireless sensor network
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A half-key key management scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
SeGrid: a secure grid infrastructure for sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Using MDS codes for the key establishment of wireless sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Two-Step hierarchical protocols for establishing session keys in wireless sensor networks
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
An efficient key pre-distribution scheme for secure distributed sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Flexible deployment models for location-aware key management in wireless sensor networks
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Hierarchical hypercube-based pairwise key establishment schemes for sensor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Key establishment between heterogenous nodes in wireless sensor and actor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Energy conserving security mechanism for wireless sensor network
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
On building a lightweight security architecture for sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A further approach on hypercube-based pairwise key establishment in sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Key predistribution in sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A strong key pre-distribution scheme for wireless sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Cooperative public key authentication protocol in wireless sensor network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Research on pairwise key establishment model and algorithm for sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A secure routing protocol for wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Efficient pairwise key establishment scheme based on random pre-distribution keys in WSN
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
A light-weighted misused key detection in wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
PKM: a pairwise key management scheme for wireless sensor networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Security problems of systems of extremely weak devices
Annales UMCS, Informatica - Security Systems
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Safe RFID system modeling using shared key pool in ubiquitous environments
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
Efficient secure aggregation in sensor networks
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
On the security of wireless sensor networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design
ISC'05 Proceedings of the 8th international conference on Information Security
Exploring message authentication in sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
A security architecture for mobile wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks
Mobile Networks and Applications
Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
A key management scheme for commodity sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
A novel pairwise key predistribution scheme for ubiquitous sensor network
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Key management for mobile sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
ARMS: an authenticated routing message in sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Combinatorial structures for design of wireless sensor networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Location-Aware key management using multi-layer grids for wireless sensor networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Securing communication trees in sensor networks
ALGOSENSORS'06 Proceedings of the Second international conference on Algorithmic Aspects of Wireless Sensor Networks
ALGOSENSORS'06 Proceedings of the Second international conference on Algorithmic Aspects of Wireless Sensor Networks
A key management scheme with encoding and improved security for wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Two's company, three is a crowd: a group-admission protocol for WSNs
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
On optimality of key pre-distribution schemes for distributed sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
A key reshuffling scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
A hybrid design of key pre-distribution scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
Autonomic communication security in sensor networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
EWSN'06 Proceedings of the Third European conference on Wireless Sensor Networks
Tree-Based key distribution patterns
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Wireless sensor replica detection in mobile environments
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Quorum-based key management scheme in wireless sensor networks
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Optimal one round almost perfectly secure message transmission (short paper)
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Foisting and stealing of keys in sensor networks
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
A novel key management scheme for wireless embedded systems
ACM SIGAPP Applied Computing Review
Framework for key management scheme in heterogeneous wireless sensor networks
iUBICOM'10 Proceedings of the 5th international conference on Ubiquitous and Collaborative Computing
VoCS'08 Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
Security and Communication Networks
An agreement protocol to handle byzantine failures in authenticated hierarchical configuration
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
Sybil attack detection through global topology pattern visualization
Information Visualization
Performance analysis of deterministic key allocation schemes for wireless sensor networks
International Journal of Wireless and Mobile Computing
Mobile Networks and Applications
International Journal of Internet Technology and Secured Transactions
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
Multihop-Based key management in hierarchical wireless sensor network
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
From key predistribution to key redistribution
Theoretical Computer Science
Hexagonal groups based key management using deployment knowledge in wireless sensor networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
ACM Transactions on Embedded Computing Systems (TECS)
On the optimal allocation of adversarial resources
Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
An improved ID-Based key management scheme in wireless sensor network
ICSI'12 Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part II
Journal of Computer and System Sciences
A key-distribution mechanism for wireless sensor networks using Zig-Zag product
International Journal of Ad Hoc and Ubiquitous Computing
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
Proceedings of the CUBE International Information Technology Conference
Unthresholded adaptive revocation technique in mobile ad hoc networks
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
Secret key revocation in sensor networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
A secure pairwise key establishment scheme in wireless ad hoc networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
A secure data aggregation scheme for wireless sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
A key revocation scheme for mobile sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Key predistribution using partially balanced designs in wireless sensor networks
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching
International Journal of Security and Networks
A survivability model in wireless sensor networks
Computers & Mathematics with Applications
On the role of expander graphs in key predistribution schemes for wireless sensor networks
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
ISC'12 Proceedings of the 15th international conference on Information Security
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks
Journal of Parallel and Distributed Computing
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
A new class of Hash-Chain based key pre-distribution schemes for WSN
Computer Communications
Key predistribution schemes for distributed sensor networks via block designs
Designs, Codes and Cryptography
Security challenges in embedded systems
ACM Transactions on Embedded Computing Systems (TECS) - Special section on ESTIMedia'12, LCTES'11, rigorous embedded systems design, and multiprocessor system-on-chip for cyber-physical systems
A hash chains based key management scheme for wireless sensor networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
ESF: an efficient security framework for wireless sensor network
International Journal of Communication Networks and Distributed Systems
Providing DoS resistance for signature-based broadcast authentication in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Code based KPD scheme with full connectivity: deterministic merging
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Unconditionally secure fully connected key establishment using deployment knowledge
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Cooperative security in distributed networks
Computer Communications
Key establishment protocols for secure communication in clustered sensor networks
International Journal of Communication Networks and Distributed Systems
Lightweight secure communication protocols for in-vehicle sensor networks
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer
Proceedings of the International Workshop on Adaptive Security
Expert key selection impact on the MANETs' performance using probabilistic key management algorithm
Proceedings of the 6th International Conference on Security of Information and Networks
Large scale wireless sensor networks with multi-level dynamic key management scheme
Journal of Systems Architecture: the EUROMICRO Journal
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach
The Journal of Supercomputing
Matrix-based pairwise key establishment for wireless mesh networks
Future Generation Computer Systems
Clone wars: Distributed detection of clone attacks in mobile WSNs
Journal of Computer and System Sciences
Cooperative secret delivery in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Mobile Networks and Applications
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
Information Sciences: an International Journal
Hi-index | 0.07 |
Key establishment in sensor networks is a challengingproblem because asymmetric key cryptosystems are unsuitablefor use in resource constrained sensor nodes, and alsobecause the nodes could be physically compromised by anadversary. We present three new mechanisms for key establishmentusing the framework of pre-distributing a randomset of keys to each node. First, in the q-compositekeys scheme, we trade off the unlikeliness of a large-scalenetwork attack in order to significantly strengthen randomkey predistribution's strength against smaller-scale attacks.Second, in the multipath-reinforcement scheme, we showhow to strengthen the security between any two nodes byleveraging the security of other links. Finally, we presentthe random-pairwise keys scheme, which perfectly preservesthe secrecy of the rest of the network when any nodeis captured, and also enables node-to-node authenticationand quorum-based revocation.