A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Denial of Service in Sensor Networks
Computer
An End-to-End Systems Approach to Elliptic Curve Cryptography
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Secure dissemination of code updates in sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Secure code distribution in dynamically programmable wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
EURASIP Journal on Embedded Systems
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Secure routing based on distributed key sharing in large-scale sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
An elliptical cryptographic algorithm for RF wireless devices
Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
Key management and secure software updates in wireless process control environments
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
An authentication scheme for filtering injected bogus data in sensor networks
Computer Communications
Delay aware, reconfigurable security for embedded systems
Proceedings of the ICST 2nd international conference on Body area networks
A public key technology platform for wireless sensor networks
Proceedings of the 6th ACM conference on Embedded network sensor systems
ARCMA: attack-resilient collaborative message authentication in wireless sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A unified security framework with three key management schemes for wireless sensor networks
Computer Communications
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
On the application of pairing based cryptography to wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
EAP-Sens: a security architecture for wireless sensor networks
Proceedings of the 4th Annual International Conference on Wireless Internet
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
A hybrid security protocol for sensor networks
International Journal of Communication Networks and Distributed Systems
JigDFS in container communities for international cargo security
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Efficient message authentication protocol for WSN
WSEAS Transactions on Computers
In situ key establishment in large-scale sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
PingPong-MAC: secure ubiquitous sensor network with authenticated encryption
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Two-factor user authentication in wireless sensor networks
IEEE Transactions on Wireless Communications
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
Identity-based authentication protocol with paring of tate on WSN
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Pervasive and Mobile Computing
A group-based security policy for wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Structures for communication-efficient public key revocation in ubiquitous sensor network
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Enabling full-size public-key algorithms on 8-bit sensor nodes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
An efficient key establishment scheme for self-organizing sensor networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Toward trusted wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Mobile Networks and Applications
Key establishment protocols using environmental and physiological data in wireless sensor networks
International Journal of Sensor Networks
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Security analysis of 'two-factor user authentication in wireless sensor networks'
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
A novel node level security policy framework for wireless sensor networks
Journal of Network and Computer Applications
Tree based protocol for key management in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Compact identity-based encryption without strong symmetric cipher
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Using data aggregation to prevent traffic analysis in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Authenticated queries in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Collision attack on XTR and a countermeasure with a fixed pattern
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Flexible deployment models for location-aware key management in wireless sensor networks
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Key establishment between heterogenous nodes in wireless sensor and actor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Cooperative public key authentication protocol in wireless sensor network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
TARF: a trust-aware routing framework for wireless sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Tiny 3-TLS: a trust delegation protocol for wireless sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
VoCS'08 Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
Security and Communication Networks
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
Journal of Medical Systems
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Information Systems and e-Business Management
A new class of Hash-Chain based key pre-distribution schemes for WSN
Computer Communications
Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks
ACM Transactions on Sensor Networks (TOSN)
Dynamic camouflage event based malicious node detection architecture
The Journal of Supercomputing
Personal and Ubiquitous Computing
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors
Computers and Electrical Engineering
Hi-index | 0.00 |
Wireless networks of miniaturized, low-power sensor/actuator devices are poised to become widely used in commercial and military environments. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two sensor networks. Our work is novel in that PK technology was commonly believed to be too inefficient for use on low-power devices. As part of our solution, we exploit the efficiency of public operations in the RSA cryptosystem and design protocols that place the computationally expensive operations on the parties external to the sensor network, when possible. Our protocols have been implemented on UC Berkeley MICA2 motes using the TinyOS development environment.