Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Password authentication with insecure communication
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
A Novel Approach for Security and Robustness in Wireless Embedded Systems
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
On handling insider attacks in wireless sensor networks
Information Security Tech. Report
TIMAR: an efficient key management scheme for ubiquitous health care environments
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
A survivability model in wireless sensor networks
Computers & Mathematics with Applications
Review: Dynamic key management in wireless sensor networks: A survey
Journal of Network and Computer Applications
Cooperative security in distributed networks
Computer Communications
Hi-index | 0.00 |
In this paper, we present a scalable and secure protocol for key revocation in Wireless Sensor Networks. The protocol guarantees an authenticated distribution of new keys that is efficient in terms of storage, communication and computing overhead. The proposed protocol reduces the number and the size of rekeying messages. It achieves the necessary level of confidentiality and authenticity of rekeying messages by only using symmetric ciphers and one-way functions. Hence, the protocol results scalable, and particularly attractive for large and/or highly dynamic groups.