Wireless integrated network sensors
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Analyzing and modeling encryption overhead for sensor network nodes
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Simulating the power consumption of large-scale sensor network applications
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Authentication protocols for ad hoc networks: taxonomy and research issues
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
SecLEACH-On the security of clustered sensor networks
Signal Processing
SeGrid: a secure grid framework for sensor networks
EURASIP Journal on Wireless Communications and Networking
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Efficient security primitives derived from a secure aggregation algorithm
Proceedings of the 15th ACM conference on Computer and communications security
Efficient public key authentication in MANET
Proceedings of the International Conference on Advances in Computing, Communication and Control
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Efficient message authentication protocol for WSN
WSEAS Transactions on Computers
In situ key establishment in large-scale sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
A multivariate key-establishment scheme for wireless sensor networks
IEEE Transactions on Wireless Communications
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
A strategy of node membership verification for wireless multimedia sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A security architecture for wireless sensor networks based-on public key cryptography
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Structures for communication-efficient public key revocation in ubiquitous sensor network
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Multi-path key establishment against REM attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Key management in secure self organized wireless sensor network: a new approach
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Enhancing broadcast authentication in sensor networks
Proceedings of the 14th Communications and Networking Symposium
On broadcast authentication in wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Flexible deployment models for location-aware key management in wireless sensor networks
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Key establishment between heterogenous nodes in wireless sensor and actor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Cooperative public key authentication protocol in wireless sensor network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of some public-key algorithms, such as Elliptic Curve Cryptography (ECC), is already close to being practical on sensor nodes. However, the energy consumption of PKC is still expensive, especially compared to symmetric-key algorithms. To maximize the lifetime of batteries, we should minimize the use of PKC whenever possible in sensor networks.This paper investigates how to replace one of the important PKC operations--the public key authentication--with symmetric key operations that are much more efficient. Public key authentication is to verify the authenticity of another party's public key to make sure that the public key is really owned by the person it is claimed to belong to. In PKC, this operation involves an expensive signature verification on a certificate. We propose an efficient alternative that uses one-way hash function only. Our scheme uses all sensor's public keys to construct a forest of Merkle trees of different heights. By optimally selecting the height of each tree, we can minimize the computation and communication costs. The performance of our scheme is evaluated in the paper.