How to construct random functions
Journal of the ACM (JACM)
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
RAP: A Real-Time Communication Architecture for Large-Scale Wireless Sensor Networks
RTAS '02 Proceedings of the Eighth IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'02)
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Routing via Single-Source and Multiple-Source Queries in Static Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A study of static versus dynamic keying schemes in sensor networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Coordinated sensor deployment for improving secure communications and sensing coverage
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
Proceedings of the 4th international conference on Mobile systems, applications and services
Po^2V Network Layer Position Verification in Multi-HopWireless Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Location-aware key establishment in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Location dependent key management using random key-predistribution in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Location-aware key predistribution scheme for wide area wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Routing of single-source and multiple-source queries in static sensor networks
Journal of Discrete Algorithms
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
ACM Transactions on Sensor Networks (TOSN)
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
SecLEACH-On the security of clustered sensor networks
Signal Processing
Pair-wise path key establishment in wireless sensor networks
Computer Communications
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Secure routing based on distributed key sharing in large-scale sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
Comparison of innovative signature algorithms for WSNs
WiSec '08 Proceedings of the first ACM conference on Wireless network security
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
International Journal of Security and Networks
A pairwise key establishment scheme for heterogeneous sensor networks
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure Time Synchronization in Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Secure Ubiquitous Health Monitoring System
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
Location-based design for secure and efficient wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Group-based intrusion detection system in wireless sensor networks
Computer Communications
A Random Key Management Scheme for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
A location-ID sensitive key establishment scheme in static wireless sensor networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
ICAIT '08 Proceedings of the 2008 International Conference on Advanced Infocomm Technology
An Improved Distributed Key Management Scheme in Wireless Sensor Networks
Information Security Applications
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
A key pre-distribution scheme for heterogeneous sensor networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A Secure Framework for Location Verification in Pervasive Computing
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
In situ key establishment in large-scale sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Distributed key management for wireless sensor networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
SCON: Secure management of continuity in sensor networks
Computer Communications
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
Dealing with random and selective attacks in wireless sensor systems
ACM Transactions on Sensor Networks (TOSN)
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Smart Dust Security -- Key Infection Revisited
Electronic Notes in Theoretical Computer Science (ENTCS)
Location-based pairwise key predistribution for wireless sensor networks
IEEE Transactions on Wireless Communications
ID-based key management strategies of clustering wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A strategy of node membership verification for wireless multimedia sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Key establishment for layered group-based Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
Tree-based key predistribution for wireless sensor networks
Wireless Networks
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
Securing wireless sensor networks against large-scale node capture attacks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Key predistribution schemes for sensor networks for continuous deployment scenario
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Using auxiliary sensors for pairwise key establishment in WSN
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
A group-based security policy for wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
Attack-resilient random key distribution scheme for distributed sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Two approaches on pairwise key path establishment for sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A method of pair-wise key distribution and management in distributed wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
An improved key management scheme for heterogeneity wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Key establishment in heterogeneous self-organized networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
A lightweight key establishment scheme for wireless sensor networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
TLKMS: a dynamic keys management scheme for large-scale wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Secure communication among cell phones and sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Framework design and performance analysis on pairwise key establishment
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes
ACM Transactions on Sensor Networks (TOSN)
Mobile Networks and Applications
A new key management scheme in heterogeneous wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
Group-based key management for mobile sensor networks
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Efficient fine-grained data access control in wireless sensor networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
A secure pervasive health care system using location dependent unicast key generation scheme
PIKM '10 Proceedings of the 3rd workshop on Ph.D. students in information and knowledge management
A novel node level security policy framework for wireless sensor networks
Journal of Network and Computer Applications
Scalable link-layer key agreement in sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
Tree based protocol for key management in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
International Journal of Sensor Networks
Distributed KDC-based random pairwise key establishment in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
A forward authentication key management scheme for heterogeneous sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A generic evaluation method for key management schemes in wireless sensor network
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
A high performance and intrinsically secure key establishment protocol for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of Sensor Networks
Centralized Key Management Scheme in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Key management in sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Key forwarding: a location-adaptive key-establishment scheme for wireless sensor networks
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
A half-key key management scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
Two-Step hierarchical protocols for establishing session keys in wireless sensor networks
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Flexible deployment models for location-aware key management in wireless sensor networks
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Key establishment and authentication mechanism for secure sensor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A further approach on hypercube-based pairwise key establishment in sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Key predistribution in sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Efficient pairwise key establishment scheme based on random pre-distribution keys in WSN
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
PKM: a pairwise key management scheme for wireless sensor networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Location-Aware key management using multi-layer grids for wireless sensor networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
On optimality of key pre-distribution schemes for distributed sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Autonomic communication security in sensor networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
A novel key management scheme for wireless embedded systems
ACM SIGAPP Applied Computing Review
Framework for key management scheme in heterogeneous wireless sensor networks
iUBICOM'10 Proceedings of the 5th international conference on Ubiquitous and Collaborative Computing
VoCS'08 Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
Performance analysis of deterministic key allocation schemes for wireless sensor networks
International Journal of Wireless and Mobile Computing
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
ACM Transactions on Embedded Computing Systems (TECS)
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
Proceedings of the CUBE International Information Technology Conference
Secure localization and location verification in wireless sensor networks: a survey
The Journal of Supercomputing
Hi-index | 0.00 |
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversaries. Establishment of pairwise keys is a fundamental security service, which forms the basis of other security services such as authentication and encryption. However, establishing pairwise keys in sensor networks is not a trivial task, particularly due to the resource constraints on sensors. This paper presents several techniques for establishing pairwise keys in static sensor networks. These techniques take advantage of the observation that in static sensor networks, although it is difficult to precisely pinpoint sensors' positions, it is often possible to approximately determine their locations. This paper presents a simple location-aware deployment model, and develops two pairwise key predistribution schemes, a closest pairwise keys predistribution scheme and a location-based pairwise keys scheme using bivariate polynomials, by taking advantage of sensors' expected locations. The analysis in this paper indicates that these schemes can achieve better performance if such location information is available and that the smaller the deployment error (i.e., the difference between a sensor's actual location and its expected location) is, the better performance they can achieve.