A study of static versus dynamic keying schemes in sensor networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Key management for long-lived sensor networks in hostile environments
Computer Communications
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
Group-based intrusion detection system in wireless sensor networks
Computer Communications
Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks
Information Networking. Towards Ubiquitous Networking and Services
A lightweight key renewal scheme for clustered sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A flexible and efficient key distribution scheme for renewable wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
ACM Transactions on Sensor Networks (TOSN)
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
A hierarchical composition of LU matrix-based key distribution scheme for sensor networks
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
A steganographic computational paradigm for wireless sensor networks
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A forward authentication key management scheme for heterogeneous sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A generic evaluation method for key management schemes in wireless sensor network
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
A key management scheme for cross-layering designs in wireless sensor networks
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
A key management scheme with encoding and improved security for wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Hi-index | 0.00 |
Wireless sensor networks have a widespectrum of civil and military applications that call forsecurity, e.g., target surveillance in hostile environments.Typical sensors possess limited computation, energy, andmemory resources; therefore the use of vastly resource-consumingsecurity mechanisms is not possible. In thispaper, we propose a cryptographic key managementprotocol, which is based on the IBSK scheme, but only twosymmetric keys are required to be pre-deployed at eachsensor. The protocol supports the eviction of thecompromised nodes. Simulation shows that the energyconsumption overhead introduced by the key managementis remarkably low thanks to the multi-tier networkarchitecture in which only sensor-to-gateway securesessions are allowed, and reports order-of-magnitudeimprovement in energy saving as compared to the originalIBSK scheme, and Kerberos-like schemes.