The official PGP user's guide
SPINS: security protocols for sensor networks
Wireless Networks
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
The capacity of wireless networks
IEEE Transactions on Information Theory
IEEE Network: The Magazine of Global Internetworking
IEEE Transactions on Mobile Computing
SecLEACH-On the security of clustered sensor networks
Signal Processing
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Collaborative authentication in unattended WSNs
Proceedings of the second ACM conference on Wireless network security
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
International Journal of Communication Networks and Distributed Systems
An Enhanced Trust Center Based Authentication in ZigBee Networks
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Temporal privacy in wireless sensor networks: Theory and practice
ACM Transactions on Sensor Networks (TOSN)
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
An efficient authentication and key management protocol for hierarchical ad hoc sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
A key management based on multiple regression in hierarchical sensor network
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A survey on secure hierarchical routing protocols in wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A generic evaluation method for key management schemes in wireless sensor network
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
PERSEN: power-efficient logical ring based key management for clustered sensor networks
International Journal of Sensor Networks
Intrusion-resilient integrity in data-centric unattended WSNs
Pervasive and Mobile Computing
Behavior-Based trust in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Key establishment protocols for secure communication in clustered sensor networks
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.01 |
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigated. In this paper, we explore the task of providing data and entity authentication for hierarchical ad hoc sensor networks. Our sensor network consists of three tiers of devices with varying levels of computational and communication capabilities. Our lowest tier consists of compute-constrained sensors that are unable to perform public key cryptography. To address this resource constraint, we present a new type of certificate, called a TESLA certificate, that can be used by low-powered nodes to perform entity authentication. Our framework authenticates incoming nodes, maintains trust relationships during topology changes through an efficient handoff scheme, and provides data origin authentication for sensor data. Further, our framework assigns authentication tasks to nodes according to their computational resources, with resource-abundant access points performing digital signatures and maintaining most of the security parameters. We conclude by providing an initial performance evaluation and security analysis for our framework.