Capacity of Ad Hoc wireless networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
SPINS: security protocols for sensor networks
Wireless Networks
Denial of Service in Sensor Networks
Computer
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Hi-index | 0.00 |
Wireless Sensor Networks (WSNs) enabled with authenticated querying [1] allows only the authorized users to inject queries into the network and get responses thereof. Queries from unauthorized users are silently dropped. Providing authenticated querying for WSN is especially very challenging since the nodes are very much resource constrained and vulnerable to physical captures by the adversary. We present a fully symmetric key based solution for the above problem and analyze the same.