An efficient key distribution scheme for heterogeneous sensor networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
International Journal of Communication Networks and Distributed Systems
ACM Transactions on Sensor Networks (TOSN)
A multipath secure routing protocol based on malicious node detection
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
A clustered routing protocol with distributed intrusion detection for wireless sensor networks
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Attack-resilient random key distribution scheme for distributed sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Dynamic resiliency analysis of key predistribution in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A survey on secure hierarchical routing protocols in wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
PERSEN: power-efficient logical ring based key management for clustered sensor networks
International Journal of Sensor Networks
KALwEN+: practical key management schemes for gossip-based wireless medical sensor networks
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
A dynamic TDMA based scheme for securing query processing in WSN
Wireless Networks
Computers and Electrical Engineering
Key establishment protocols for secure communication in clustered sensor networks
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also advantages in terms of security, the dynamic nature of their communication makes most existing security solutions inadequate for them. In this paper, we show how random key predistribution, widely studied in the context of flat networks, can be used to secure communication in hierarchical (cluster-based) protocols such as LEACH. To our knowledge, it is the first work that investigates random key predistribution as applied to hierarchical WSNs.