LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Path key establishment using multiple secured paths in wireless sensor networks
CoNEXT '05 Proceedings of the 2005 ACM conference on Emerging network experiment and technology
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
Proceedings of the 4th international conference on Mobile systems, applications and services
Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Robust self-keying mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
Journal of Computer Security
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
ACM Transactions on Sensor Networks (TOSN)
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
On identifying malicious nodes in ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
An efficient key distribution scheme for heterogeneous sensor networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
SecLEACH-On the security of clustered sensor networks
Signal Processing
SeGrid: a secure grid framework for sensor networks
EURASIP Journal on Wireless Communications and Networking
EURASIP Journal on Wireless Communications and Networking
Pair-wise path key establishment in wireless sensor networks
Computer Communications
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Modeling pairwise key establishment for random key predistribution in large-scale sensor networks
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 2nd international conference on Ubiquitous information management and communication
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
Electronic Notes in Theoretical Computer Science (ENTCS)
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
ACM Transactions on Sensor Networks (TOSN)
Efficient path key establishment for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Distributed data source verification in wireless sensor networks
Information Fusion
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
An on-demand key establishment protocol for MANETs
International Journal of Wireless and Mobile Computing
In situ key establishment in large-scale sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
A lightweight secure protocol for wireless sensor networks
Computer Communications
Identity-based secure protocol scheme for wireless sensor network
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
FGIT '09 Proceedings of the 1st International Conference on Future Generation Information Technology
REP: Location Privacy for VANETs Using Random Encryption Periods
Mobile Networks and Applications
Attack-resilient random key distribution scheme for distributed sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Securing random key predistribution against semi-honest adversaries
INSS'09 Proceedings of the 6th international conference on Networked sensing systems
Multi-path key establishment against REM attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Research challenges towards the Future Internet
Computer Communications
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
A new scheme for establishing pairwise keys for wireless sensor networks
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
A key management scheme for cross-layering designs in wireless sensor networks
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Authenticated queries in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Flexible deployment models for location-aware key management in wireless sensor networks
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
A strong key pre-distribution scheme for wireless sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Utilizing secure three hop links to agree pairwise keys in wireless sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Safe RFID system modeling using shared key pool in ubiquitous environments
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Efficient secure aggregation in sensor networks
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
Self-configurable key pre-distribution in mobile ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
Security and Communication Networks
Performance analysis of deterministic key allocation schemes for wireless sensor networks
International Journal of Wireless and Mobile Computing
A secure pairwise key establishment scheme in wireless ad hoc networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
A new class of Hash-Chain based key pre-distribution schemes for WSN
Computer Communications
A communication efficient group key distribution scheme for MANETs
NSS'12 Proceedings of the 6th international conference on Network and System Security
An improved data security using DNA sequencing
Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare
Key establishment protocols for secure communication in clustered sensor networks
International Journal of Communication Networks and Distributed Systems
Broadcast encryption based non-interactive key distribution in MANETs
Journal of Computer and System Sciences
Hi-index | 0.00 |
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a scalable and distributed protocol that enables two nodes to establish a pairwise shared key on the fly, without requiring the use of any on-line key distribution center. The design of our protocol is based on a novel combination of two techniques 驴 probabilistic key sharing and threshold secret sharing. Our protocol is scalable since every node only needs to possess a small number of keys, independent of the network size, and it is computationally efficient because it only relies on symmetric key cryptography based operations. We show that a pairwise key established between two nodes using our protocol is secure against a collusion attack by up to a certain number of compromised nodes. We also show through a set of simulations that our protocol can be parameterized to meet the desired levels of performance, security and storage for the application under consideration.