Secure code distribution in dynamically programmable wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
Electronic Notes in Theoretical Computer Science (ENTCS)
Information Systems Frontiers
Security weakness in a dynamic program update protocol for wireless sensor networks
IEEE Communications Letters
Software-based remote code attestation in wireless sensor network
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
Efficient data aggregation with in-network integrity control for WSN
Journal of Parallel and Distributed Computing
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Review: Dynamic key management in wireless sensor networks: A survey
Journal of Network and Computer Applications
6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer
Proceedings of the International Workshop on Adaptive Security
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
Establishing secure links between pairs of directly connected sensor nodes is an important primitive for building secure wireless sensor networks. This paper systematically identifies two important security requirements of pairwise key setup in wireless sensor networks, namely opaqueness and inoculation. Transitory master key schemes, such as the LEAP protocol, can satisfy both requirements if the master key has not been compromised. However, if the master key is compromised, every key in the network is exposed to an adversary. To prevent the master key from becoming a single point failure of the whole system, we propose a new opaque transitory master key (OTMK) scheme for pairwise key setup in sensor networks. In OTMK, even if the master key is compromised, an adversary can only exploit a small number of keys nearby the compromised node, while other keys in the network remain safe. To further investigate key establishment schemes, we experimented with a way to compromise a sensor node, and tested our key establishment time in a real sensor network environment.