Next century challenges: mobile networking for “Smart Dust”
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Clustering algorithms for wireless ad hoc networks
DIALM '00 Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
System architecture directions for networked sensors
ACM SIGPLAN Notices
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Dynamic Power Management in Wireless Sensor Networks
IEEE Design & Test
Secure Selective Exclusion in Ad Hoc Wireless Network
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Distributed Clustering for Ad Hoc Networks
ISPAN '99 Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms and Networks
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
New multiparty authentication services and key agreement protocols
IEEE Journal on Selected Areas in Communications
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Path key establishment using multiple secured paths in wireless sensor networks
CoNEXT '05 Proceedings of the 2005 ACM conference on Emerging network experiment and technology
IEEE Transactions on Mobile Computing
Rijndael for Sensor Networks: Is Speed the Main Issue?
Electronic Notes in Theoretical Computer Science (ENTCS)
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
An efficient key distribution scheme for heterogeneous sensor networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
SecLEACH-On the security of clustered sensor networks
Signal Processing
EURASIP Journal on Wireless Communications and Networking
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Reliable data delivery in wireless sensor networks using distributed cluster monitoring
International Journal of Sensor Networks
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
International Journal of Security and Networks
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
Electronic Notes in Theoretical Computer Science (ENTCS)
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
A security policy language for wireless sensor networks
Journal of Systems and Software
A Random Key Management Scheme for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Evolutionary design of secrecy amplification protocols for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network
Journal of Network and Computer Applications
Distributed data source verification in wireless sensor networks
Information Fusion
Identity-based secure protocol scheme for wireless sensor network
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A multivariate key-establishment scheme for wireless sensor networks
IEEE Transactions on Wireless Communications
Smart Dust Security -- Key Infection Revisited
Electronic Notes in Theoretical Computer Science (ENTCS)
A clustered routing protocol with distributed intrusion detection for wireless sensor networks
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
The subset keys and identity tickets (SKIT) key distribution scheme
IEEE Transactions on Information Forensics and Security
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
Attack-resilient random key distribution scheme for distributed sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Private key agreement and secure communication for heterogeneous sensor networks
Journal of Parallel and Distributed Computing
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
A generic evaluation method for key management schemes in wireless sensor network
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Applying key infrastructures for sensor networks in CIP/CIIP scenarios
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
A new scheme for establishing pairwise keys for wireless sensor networks
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
Two-Step hierarchical protocols for establishing session keys in wireless sensor networks
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Hierarchical hypercube-based pairwise key establishment schemes for sensor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Two's company, three is a crowd: a group-admission protocol for WSNs
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Performance analysis of deterministic key allocation schemes for wireless sensor networks
International Journal of Wireless and Mobile Computing
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
ACM Transactions on Embedded Computing Systems (TECS)
Self-healing in unattended wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Improving data quality using a cross layer protocol in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Authenticated health monitoring scheme for wireless body sensor networks
Proceedings of the 7th International Conference on Body Area Networks
Key establishment protocols for secure communication in clustered sensor networks
International Journal of Communication Networks and Distributed Systems
DARE: evaluating Data Accuracy using node REputation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
A distributed Wireless Sensor Network (WSN) is a collection of n sensors with limited hardware resources. Sensors can exchange messages via Radio Frequency (RF), whose range usually covers only a limited number of other sensors. An interesting problem is how to implement secure pair-wise communications among any pair of sensors in a WSN. A WSN requires completely distributed solutions which are particularly challenging due to the limited resources and the size of the network. Moreover, WSNs can be subject to several security threats, including the physical compromising of a sensor. Hence, any solution for secure pairwise communications should tolerate the collusion of a set of corrupted sensors. This paper describes a probabilistic model and two protocols to establish a secure pair-wise communication channel between any pair of sensors in the WSN, by assigning a small set of random keys to each sensor. We build, based on the first Direct Protocol, a second Co-operative Protocol. The Co-operative Protocol is adaptive: its security properties can be dynamically changed during the life-time of the WSN. Both protocols also guarantee implicit and probabilistic mutual authentication without any additional overhead and without the presence of a base station. The performance of the Direct Protocol is analytically characterized while, for the Co-operative Protocol, we provide both analytical evaluations and extensive simulations. For example, the results show that, assuming each sensor stores 120 keys, in a WSN composed of 1024 sensors with 32 corrupted sensors the probability of a channel corruption is negligible in the case of the Co-operative Protocol.