GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
TPSS: a time-based positioning scheme for sensor networks with short range beacons
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
A Random Key Management Scheme for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
A new resilient key management protocol for wireless sensor networks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
An improved key management scheme for heterogeneity wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A lightweight key establishment scheme for wireless sensor networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |
Due to its efficiency, symmetric key cryptography is very attractive in sensor networks. A number of pairwise key pre-distribution protocols have been proposed, but the scalability is often constrained by the conflict between the desired probability of sharing keys between two nodes and the resilience against node capture attack under a given storage capacity for key-related information within each sensor. In this paper, we propose LKE, a self-configuring scheme for location-aware key establishment that targets resource-constrained sensor networks. In LKE, location information is employed for a deterministic key space generation and keying information distribution. LKE exhibits "perfect" security in against node capture attack and achieves high connectivity (close to 1) in the induced key-sharing graph at the expense of a small amount of memory in worker sensors. LKE is a pure in-situ key establishment scheme, which scales well to very large sensor networks.