Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Password authentication with insecure communication
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Secure multicast in wireless networks of mobile hosts: protocols and issues
Mobile Networks and Applications
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
Denial of Service in Sensor Networks
Computer
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
MANTIS: system support for multimodAl NeTworks of in-situ sensors
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Computation hierarchy for in-network processing
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
MetaCricket: a designer's kit for making computational devices
IBM Systems Journal
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Collaborative in-network processing for target tracking
EURASIP Journal on Applied Signal Processing
Adaptive and decentralized operator placement for in-network query processing
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
IEEE Transactions on Mobile Computing
Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Rijndael for Sensor Networks: Is Speed the Main Issue?
Electronic Notes in Theoretical Computer Science (ENTCS)
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
SecLEACH-On the security of clustered sensor networks
Signal Processing
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
ACM Transactions on Sensor Networks (TOSN)
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Robust and efficient aggregate query processing in wireless sensor networks
Mobile Networks and Applications
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Study of security base on wireless sensor network routing protocol
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hypercube-based key management in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hiberarchy cluster model and key management in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A key management based on multiple regression in hierarchical sensor network
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A space-efficient algorithm for pre-distributing pairwise keys in sensor networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part III
Authenticated queries in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Behavior-Based trust in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Efficient secure aggregation in sensor networks
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Secure cluster header election techniques in sensor network
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
A survivability model in wireless sensor networks
Computers & Mathematics with Applications
Hi-index | 0.00 |
The benefits of in-network processing for wireless sensor networks include improved scalability, prolonged lifetime, and increased versatility. This paper addresses the challenges associated with securing in-network processing within WSNs, and proposes a collection of mechanisms for delegating trust to aggregators that are not initially trusted by individual sensor nodes. Security mechanisms are proposed to address the downstream requirement that sensor nodes authenticate commands disseminated from parent aggregators. Conversely, security mechanisms are also proposed to address the upstream requirement that aggregators authenticate data produced by sensors before aggregating. Simulation results in ns2 of the proposed mechanisms for secure in-network processing are presented, as well as implementation on a mote testbed.