How to construct random functions
Journal of the ACM (JACM)
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key distribution techniques for sensor networks
Wireless sensor networks
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Revisiting random key pre-distribution schemes for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Connectivity properties of secure wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Smart dust, friend or foe?: replacing identity with configuration trust
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Proceedings of the 4th ACM workshop on Wireless security
Researches on scheme of pairwise key establishment for distributed sensor networks
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A study of static versus dynamic keying schemes in sensor networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks
IEEE Transactions on Dependable and Secure Computing
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Coordinated sensor deployment for improving secure communications and sensing coverage
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Secure code distribution in dynamically programmable wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
Proceedings of the 4th international conference on Mobile systems, applications and services
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Symmetric key based authenticated querying in wireless sensor networks
InterSense '06 Proceedings of the first international conference on Integrated internet ad hoc and sensor networks
Location-aware key establishment in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing
Location dependent key management using random key-predistribution in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Diversify sensor nodes to improve resilience against node compromise
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Location-aware key predistribution scheme for wide area wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
A secure alternate path routing in sensor networks
Computer Communications
Robust self-keying mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
Journal of Computer Security
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
ACM Transactions on Sensor Networks (TOSN)
Key management for long-lived sensor networks in hostile environments
Computer Communications
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks
Journal of Parallel and Distributed Computing
On identifying malicious nodes in ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
SeGrid: a secure grid framework for sensor networks
EURASIP Journal on Wireless Communications and Networking
Pair-wise path key establishment in wireless sensor networks
Computer Communications
A survey of key management schemes in wireless sensor networks
Computer Communications
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Securing distributed data storage and retrieval in sensor networks
Pervasive and Mobile Computing
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
Modeling pairwise key establishment for random key predistribution in large-scale sensor networks
IEEE/ACM Transactions on Networking (TON)
Secure routing based on distributed key sharing in large-scale sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Slede: a domain-specific verification framework for sensor network security protocol implementations
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Proceedings of the 2nd international conference on Ubiquitous information management and communication
International Journal of Security and Networks
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
International Journal of Sensor Networks
Efficient anonymity schemes for clustered wireless sensor networks
International Journal of Sensor Networks
Reliable data delivery in wireless sensor networks using distributed cluster monitoring
International Journal of Sensor Networks
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
A pairwise key establishment scheme for heterogeneous sensor networks
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
Electronic Notes in Theoretical Computer Science (ENTCS)
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
ACM Transactions on Sensor Networks (TOSN)
Attack distribution modeling and its applications in sensor network security
EURASIP Journal on Wireless Communications and Networking
Maximum supported network coverage area and cost evaluation of key pre-distribution schemes
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks
Computer Communications
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
A Key Predistribution Scheme Based on 3-Designs
Information Security and Cryptology
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
SAKE: Software Attestation for Key Establishment in Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Secure Ubiquitous Health Monitoring System
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
Location-based design for secure and efficient wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Proceedings of the 4th international conference on Security and privacy in communication netowrks
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A novel access control protocol for secure sensor networks
Computer Standards & Interfaces
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Group-based intrusion detection system in wireless sensor networks
Computer Communications
A Random Key Management Scheme for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Evolutionary design of secrecy amplification protocols for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Securing network access in wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Multicast Encryption Infrastructure for Security in Sensor Networks
International Journal of Distributed Sensor Networks
ACM Transactions on Sensor Networks (TOSN)
An Improved Distributed Key Management Scheme in Wireless Sensor Networks
Information Security Applications
Secure multidimensional range queries in sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Privacy-aware routing in sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network
Journal of Network and Computer Applications
Key Predistribution Schemes Using Codes in Wireless Sensor Networks
Information Security and Cryptology
Comments on “Distributed symmetric key management for mobile ad hoc networks”
Information Processing Letters
Distributed data source verification in wireless sensor networks
Information Fusion
RTKPS: A Key Pre-distribution Scheme Based on Rooted-Tree in Wireless Sensor and Actor Network
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part III
Random sampling key revocation scheme for distributed sensor networks
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
A key pre-distribution scheme for heterogeneous sensor networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A flexible and efficient key distribution scheme for renewable wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Secure many to many routing for wireless sensor and actuator networks
Proceedings of the 2nd international conference on Security of information and networks
An authentication scheme for locating compromised sensor nodes in WSNs
Journal of Network and Computer Applications
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
In situ key establishment in large-scale sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
SCON: Secure management of continuity in sensor networks
Computer Communications
A lightweight secure protocol for wireless sensor networks
Computer Communications
Secret instantiation in ad-hoc networks
Computer Communications
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
GeoSENS: geo-based sensor network secure communication protocol
Computer Communications
IEEE Transactions on Information Forensics and Security
ACM Transactions on Sensor Networks (TOSN)
Key establishment schemes against storage-bounded adversaries in wireless sensor networks
IEEE Transactions on Wireless Communications
ASGrid: autonomic management of hybrid sensor grid systems and applications
International Journal of Sensor Networks
Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
Computer Networks: The International Journal of Computer and Telecommunications Networking
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
Cross-layer enhanced source location privacy in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
A simple non-interactive pairwise key establishment scheme in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
A constrained function based message authentication scheme for sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Dealing with random and selective attacks in wireless sensor systems
ACM Transactions on Sensor Networks (TOSN)
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Research on biological immunity principle based security model for wireless sensor network
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Distributed node authentication in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hypercube-based key management in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hiberarchy cluster model and key management in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A security architecture for wireless sensor networks based-on public key cryptography
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Key establishment for layered group-based Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
Tree-based key predistribution for wireless sensor networks
Wireless Networks
Efficient compromising resilient authentication schemes for large scale wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
Securing wireless sensor networks against large-scale node capture attacks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
MKPS: a multi-level key pre-distribution scheme for secure wireless sensor networks
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction platforms and techniques
Energy-efficient and non-interactive self-certification in MANETs
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
A time-based key management protocol for wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A new resilient key management protocol for wireless sensor networks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Efficient user authentication and key agreement in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A key management based on multiple regression in hierarchical sensor network
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Efficient and distributed access control for sensor networks
DCOSS'07 Proceedings of the 3rd IEEE international conference on Distributed computing in sensor systems
The subset keys and identity tickets (SKIT) key distribution scheme
IEEE Transactions on Information Forensics and Security
Key predistribution schemes for sensor networks for continuous deployment scenario
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Using auxiliary sensors for pairwise key establishment in WSN
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
A key predistribution scheme for wireless sensor networks using the small-world concept
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
A secure time synchronization protocol for sensor network
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
On grid-based key pre-distribution: toward a better connectivity in wireless sensor network
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
A loop-based key management scheme for wireless sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Multigrid based key predistribution scheme in ad hoc networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
LBKERS: a new efficient key management scheme for wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Structures for communication-efficient public key revocation in ubiquitous sensor network
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
An improved key management scheme for heterogeneity wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A key establishment scheme for large-scale mobile wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
A new key-predistribution scheme for highly mobile sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
A lightweight key establishment scheme for wireless sensor networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Securing random key predistribution against semi-honest adversaries
INSS'09 Proceedings of the 6th international conference on Networked sensing systems
Authenticated data compression in delay tolerant wireless sensor networks
INSS'09 Proceedings of the 6th international conference on Networked sensing systems
A secure communication scheme for mobile wireless sensor networks using hamming distance
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
TLKMS: a dynamic keys management scheme for large-scale wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
An efficient re-keying scheme for cluster based wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
N-dimensional grid-based key predistribution in wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
MPC: mitigating stealthy power control attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
CAT: building couples to early detect node compromise attack in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Tame pool-based pairwise key predistribution for large-scale sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
An efficient post-deployment key establishment scheme for heterogeneous sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure communication among cell phones and sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Framework design and performance analysis on pairwise key establishment
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Dynamic resiliency analysis of key predistribution in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A survey of key predistribution schemes for key management in wireless sensor networks
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes
ACM Transactions on Sensor Networks (TOSN)
Mobile Networks and Applications
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
Journal of Intelligent Manufacturing
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Efficient and distributed access control for sensor networks
Wireless Networks
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Scalable link-layer key agreement in sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
On the performance of a distributed key management scheme in heterogeneous wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
EURASIP Journal on Wireless Communications and Networking
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
Compromise-resilient anti-jamming for wireless sensor networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Key pre-distribution using partially balanced designs in wireless sensor networks
International Journal of High Performance Computing and Networking
International Journal of Sensor Networks
Distributed KDC-based random pairwise key establishment in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
Energy analysis of RSA and ELGAMAL algorithms for wireless sensor networks
ELECTRO'10 Proceedings of the 8th WSEAS international conference on Applied electromagnetics, wireless and optical communications
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Efficient pairwise key establishment scheme for sensor networks
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
PDA: Privacy-Preserving Data Aggregation for Information Collection
ACM Transactions on Sensor Networks (TOSN)
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
PERSEN: power-efficient logical ring based key management for clustered sensor networks
International Journal of Sensor Networks
Determining parameters of key predistribution schemes via linear codes in wireless sensor networks
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Product construction of key distribution schemes for sensor networks
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Deterministic key predistribution schemes for distributed sensor networks
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
MICAI'06 Proceedings of the 5th Mexican international conference on Artificial Intelligence
Achieving distributed user access control in sensor networks
Ad Hoc Networks
Key management in sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Pairwise key setup and authentication utilizing deployment information for secure sensor network
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Key forwarding: a location-adaptive key-establishment scheme for wireless sensor networks
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
Distributed user access control in sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Locating compromised sensor nodes through incremental hashing authentication
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
A noble key pre-distribution scheme with LU matrix for secure wireless sensor networks
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Randomized grid based scheme for wireless sensor network
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
SeGrid: a secure grid infrastructure for sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Using MDS codes for the key establishment of wireless sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
An efficient key pre-distribution scheme for secure distributed sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Flexible deployment models for location-aware key management in wireless sensor networks
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Compromised nodes in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Key establishment and authentication mechanism for secure sensor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Key predistribution in sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Cooperative public key authentication protocol in wireless sensor network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Research on pairwise key establishment model and algorithm for sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Utilizing secure three hop links to agree pairwise keys in wireless sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
SecDEACH: secure and resilient dynamic clustering protocol preserving data privacy in WSNs
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Efficient pairwise key establishment scheme based on random pre-distribution keys in WSN
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
A light-weighted misused key detection in wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
PKM: a pairwise key management scheme for wireless sensor networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Safe RFID system modeling using shared key pool in ubiquitous environments
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Efficient secure aggregation in sensor networks
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design
ISC'05 Proceedings of the 8th international conference on Information Security
A security architecture for mobile wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks
Mobile Networks and Applications
Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Ensuring data storage security against frequency-based attacks in wireless networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
A novel pairwise key predistribution scheme for ubiquitous sensor network
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
ARMS: an authenticated routing message in sensor networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Combinatorial structures for design of wireless sensor networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Public key cryptography sans certificates in ad hoc networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
On optimality of key pre-distribution schemes for distributed sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A key reshuffling scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
A hybrid design of key pre-distribution scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
A game based model of security for key predistribution schemes in wireless sensor network
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
User revocation in secure adhoc networks
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
EWSN'06 Proceedings of the Third European conference on Wireless Sensor Networks
Tree-Based key distribution patterns
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Quorum-based key management scheme in wireless sensor networks
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Foisting and stealing of keys in sensor networks
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
VoCS'08 Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
MSN: mutual secure neighbor verification in multi-hop wireless networks
Security and Communication Networks
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
ACM Transactions on Embedded Computing Systems (TECS)
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
Proceedings of the CUBE International Information Technology Conference
Secret key revocation in sensor networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
A secure pairwise key establishment scheme in wireless ad hoc networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Key predistribution using partially balanced designs in wireless sensor networks
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
A survivability model in wireless sensor networks
Computers & Mathematics with Applications
AK-PPM: an authenticated packet attribution scheme for mobile ad hoc networks
RAID'12 Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
ISC'12 Proceedings of the 15th international conference on Information Security
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks
Journal of Parallel and Distributed Computing
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
A new class of Hash-Chain based key pre-distribution schemes for WSN
Computer Communications
Providing DoS resistance for signature-based broadcast authentication in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Code based KPD scheme with full connectivity: deterministic merging
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Securing the IP-based internet of things with HIP and DTLS
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
An improved data security using DNA sequencing
Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare
Key establishment protocols for secure communication in clustered sensor networks
International Journal of Communication Networks and Distributed Systems
Expert key selection impact on the MANETs' performance using probabilistic key management algorithm
Proceedings of the 6th International Conference on Security of Information and Networks
Cooperative secret delivery in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensors, it is infeasible to use traditional key management techniques such as public key cryptography and key distribution center (KDC). To facilitate the study of novel pairwise key predistribution techniques, this paper presents a general framework for establishing pairwise keys between sensors on the basis of a polynomial-based key predistribution protocol [2]. This paper then presents two efficient instantiations of the general framework: a random subset assignment key predistribution scheme and a grid-based key predistribution scheme. The analysis in this paper indicates that these two schemes have a number of nice properties, including high probability (or guarantee) to establish pairwise keys, tolerance of node captures, and low communication overhead. Finally, this paper presents a technique to reduce the computation at sensors required by these schemes.