A taxonomy of wireless micro-sensor network models
ACM SIGMOBILE Mobile Computing and Communications Review
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
On Key Agreement and Conference Key Agreement
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A Low-Energy Key Management Protocol for Wireless Sensor Networks
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Combinatorial Optimization of Group Key Management
Journal of Network and Systems Management
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks
IEEE Transactions on Mobile Computing
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
A survey of key management schemes in wireless sensor networks
Computer Communications
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
A unified security framework with three key management schemes for wireless sensor networks
Computer Communications
Group-based intrusion detection system in wireless sensor networks
Computer Communications
A location-ID sensitive key establishment scheme in static wireless sensor networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Adaptive and energy efficient clustering architecture for dynamic sensor networks
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
A lightweight key renewal scheme for clustered sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Distributed key management for wireless sensor networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
TIMAR: an efficient key management scheme for ubiquitous health care environments
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
ACM Transactions on Sensor Networks (TOSN)
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
A loop-based key management scheme for wireless sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
LBKERS: a new efficient key management scheme for wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
An efficient re-keying scheme for cluster based wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
A forward authentication key management scheme for heterogeneous sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
IRW: low-cost localization with error control in fading environments
WASA'11 Proceedings of the 6th international conference on Wireless algorithms, systems, and applications
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Framework for key management scheme in heterogeneous wireless sensor networks
iUBICOM'10 Proceedings of the 5th international conference on Ubiquitous and Collaborative Computing
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
Proceedings of the CUBE International Information Technology Conference
Key predistribution schemes for distributed sensor networks via block designs
Designs, Codes and Cryptography
A hash chains based key management scheme for wireless sensor networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Review: Dynamic key management in wireless sensor networks: A survey
Journal of Network and Computer Applications
Expert key selection impact on the MANETs' performance using probabilistic key management algorithm
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
Recent advances in wireless sensor networks (WSNs) are fueling the interest in their application in a wide variety of sensitive settings such as battlefield surveillance, border control, and infrastructure protection. Data confidentiality and authenticity are critical in these settings. However, the wireless connectivity, the absence of physical protection, the close interaction between WSNs and their physical environment, and the unattended deployment of WSNs make them highly vulnerable to node capture as well as a wide range of network-level attacks. Moreover, the constrained energy, memory, and computational capabilities of the employed sensor nodes limit the adoption of security solutions designed for wire-line and wireless networks. In this paper, we focus on the management of encryption keys in large-scale clustered WSNs. We propose a novel distributed key management scheme based on Exclusion Basis Systems (EBS); a combinatorial formulation of the group key management problem. Our scheme is termed SHELL because it is Scalable, Hierarchical, Efficient, Location-aware, and Light-weight. Unlike most existing key management schemes for WSNs, SHELL supports rekeying and, thus, enhances network security and survivability against node capture. SHELL distributes key management functionality among multiple nodes and minimizes the memory and energy consumption through trading off the number of keys and rekeying messages. In addition, SHELL employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes by factoring the geographic location of nodes in key assignment. Simulation results demonstrate that SHELL significantly boosts the network resilience to attacks while conservatively consuming nodes' resources.