An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Next century challenges: mobile networking for “Smart Dust”
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Information and Computation
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
IEEE Communications Magazine
Self-organised group key management for ad hoc networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Location dependent key management using random key-predistribution in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Location-aware key predistribution scheme for wide area wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
ACM Transactions on Sensor Networks (TOSN)
SecLEACH-On the security of clustered sensor networks
Signal Processing
Modeling pairwise key establishment for random key predistribution in large-scale sensor networks
IEEE/ACM Transactions on Networking (TON)
ACM Transactions on Information and System Security (TISSEC)
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
WiSec '08 Proceedings of the first ACM conference on Wireless network security
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Efficient anonymity schemes for clustered wireless sensor networks
International Journal of Sensor Networks
A pairwise key establishment scheme for heterogeneous sensor networks
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
Efficient path key establishment for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
Rule-based dependency models for security protocol analysis
Integrated Computer-Aided Engineering
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Location-based design for secure and efficient wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An authentication scheme for filtering injected bogus data in sensor networks
Computer Communications
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Security co-existence of wireless sensor networks and RFID for pervasive computing
Computer Communications
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Write Markers for Probabilistic Quorum Systems
OPODIS '08 Proceedings of the 12th International Conference on Principles of Distributed Systems
A new method for intrusion detection on hierarchical wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Random Visitor: Defense against Identity Attacks in P2P Networks
IEICE - Transactions on Information and Systems
Key Predistribution Schemes for Sensor Networks Using Finite Plane Geometry
IEICE - Transactions on Information and Systems
ACM Transactions on Sensor Networks (TOSN)
A key management protocol with robust continuity for sensor networks
Computer Standards & Interfaces
Comments on “Distributed symmetric key management for mobile ad hoc networks”
Information Processing Letters
Message authentication for wireless sensor networks
CIS'09 Proceedings of the international conference on Computational and information science 2009
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
An on-demand key establishment protocol for MANETs
International Journal of Wireless and Mobile Computing
Efficient message authentication protocol for WSN
WSEAS Transactions on Computers
A lightweight secure protocol for wireless sensor networks
Computer Communications
Multi-neighbor random key pre-distribution: a probabilistic analysis
IEEE Communications Letters
ACM Transactions on Sensor Networks (TOSN)
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
FKM: a fingerprint-based key management protocol for SoC-based sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
FGIT '09 Proceedings of the 1st International Conference on Future Generation Information Technology
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
Location-based pairwise key predistribution for wireless sensor networks
IEEE Transactions on Wireless Communications
An efficient broadcast encryption scheme for wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A clustered routing protocol with distributed intrusion detection for wireless sensor networks
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Identifying dependency between secure messages for protocol analysis
KSEM'07 Proceedings of the 2nd international conference on Knowledge science, engineering and management
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
A fuzzy-based en-route filtering scheme in sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
On grid-based key pre-distribution: toward a better connectivity in wireless sensor network
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
A hierarchical composition of LU matrix-based key distribution scheme for sensor networks
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Attack-resilient random key distribution scheme for distributed sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A loop-based key management scheme for wireless sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
LBKERS: a new efficient key management scheme for wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Key establishment in heterogeneous self-organized networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Network coding protocols for secret key distribution
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Private key agreement and secure communication for heterogeneous sensor networks
Journal of Parallel and Distributed Computing
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Distinct difference configurations: multihop paths and key predistribution in sensor networks
IEEE Transactions on Information Theory
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Key pre-distribution using partially balanced designs in wireless sensor networks
International Journal of High Performance Computing and Networking
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure mobile subscription of sensor-encrypted data
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
Secure and highly efficient three level key management scheme for MANET
WSEAS Transactions on Computers
Centralized Key Management Scheme in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Diverging keys in wireless sensor networks
ISC'06 Proceedings of the 9th international conference on Information Security
A key management scheme for large scale distributed sensor networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
An efficient ID-Based bilinear key predistribution scheme for distributed sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Body sensor network key distribution using human interactive channels
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
A resource-optimal key pre-distribution scheme with enhanced security for wireless sensor networks
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
Using MDS codes for the key establishment of wireless sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Behavior-Based trust in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A key management scheme for commodity sensor networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Location-Aware key management using multi-layer grids for wireless sensor networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
A key management scheme with encoding and improved security for wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
A game based model of security for key predistribution schemes in wireless sensor network
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Quorum-based key management scheme in wireless sensor networks
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Foisting and stealing of keys in sensor networks
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
Journal of Computer and System Sciences
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
Proceedings of the CUBE International Information Technology Conference
Migrating operator placement for compositional stream graphs
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Security and privacy issues for the network of the future
Security and Communication Networks
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Secret key revocation in sensor networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
An adaptable and scalable group access control scheme for managing wireless sensor networks
Telematics and Informatics
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
ISC'12 Proceedings of the 15th international conference on Information Security
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks
Journal of Parallel and Distributed Computing
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Key predistribution schemes for distributed sensor networks via block designs
Designs, Codes and Cryptography
Mobile node authentication using key distribution scheme in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
A hash chains based key management scheme for wireless sensor networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Review: Dynamic key management in wireless sensor networks: A survey
Journal of Network and Computer Applications
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Matrix-based pairwise key establishment for wireless mesh networks
Future Generation Computer Systems
Journal of Network and Computer Applications
Broadcast encryption based non-interactive key distribution in MANETs
Journal of Computer and System Sciences
Cooperative secret delivery in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.06 |
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating parties. Due to resource constraints, however, achieving key agreement in wireless sensor networks is nontrivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and other public-key based schemes, are not suitable for wireless sensor networks due to the limited computational abilities of the sensor nodes. Predistribution of secret keys for all pairs of nodes is not viable due to the large amount of memory this requires when the network size is large.In this paper, we provide a framework in which to study the security of key predistribution schemes, propose a new key predistribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resilience and associated overhead. Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that communications between any additional nodes are compromised is close to zero. This desirable property lowers the initial payoff of smaller-scale network breaches to an adversary, and makes it necessary for the adversary to attack a large fraction of the network before it can achieve any significant gain.