An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Password authentication with insecure communication
Communications of the ACM
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Supporting Aggregate Queries Over Ad-Hoc Wireless Sensor Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Practical Broadcast Authentication in Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Almost optimal hash sequence traversal
FC'02 Proceedings of the 6th international conference on Financial cryptography
Efficient constructions for one-way hash chains
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A*-based key tree structure generation for group key management in wireless sensor networks
Computer Communications
A location-ID sensitive key establishment scheme in static wireless sensor networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Ayushman: a secure, usable pervasive health monitoring system
Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments
Information Systems Frontiers
EAP-Sens: a security architecture for wireless sensor networks
Proceedings of the 4th Annual International Conference on Wireless Internet
TIMAR: an efficient key management scheme for ubiquitous health care environments
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
Random key pre-distribution with transitory master key for wireless sensor networks
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks
Proceedings of the 2010 ACM Symposium on Applied Computing
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
Tame pool-based pairwise key predistribution for large-scale sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
An efficient post-deployment key establishment scheme for heterogeneous sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
PSKA: usable and secure key agreement scheme for body area networks
IEEE Transactions on Information Technology in Biomedicine
Statistical anomaly detection with sensor networks
ACM Transactions on Sensor Networks (TOSN)
Efficient sensor node authentication via 3GPP mobile communication networks
Proceedings of the 17th ACM conference on Computer and communications security
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Compromise-resilient anti-jamming for wireless sensor networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A calculus for the analysis of wireless network security protocols
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
International Journal of Sensor Networks
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Applying time-bound hierarchical key assignment in wireless sensor networks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Public key cryptography-based security scheme for wireless sensor networks in healthcare
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Manipulation as a security mechanism in sensor networks
SBP'10 Proceedings of the Third international conference on Social Computing, Behavioral Modeling, and Prediction
Foisting and stealing of keys in sensor networks
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
A semantic analysis of wireless network security protocols
NFM'12 Proceedings of the 4th international conference on NASA Formal Methods
Secure and efficient dynamic program update in wireless sensor networks
Security and Communication Networks
Multihop-Based key management in hierarchical wireless sensor network
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Lightweight user access control in energy-constrained wireless network services
UCAmI'12 Proceedings of the 6th international conference on Ubiquitous Computing and Ambient Intelligence
Proceedings of the second ACM MobiHoc workshop on Airborne networks and communications
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes
International Journal of Critical Computer-Based Systems
Hi-index | 0.01 |
We describe LEAP+ (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated by the observation that different types of messages exchanged between sensor nodes have different security requirements, and that a single keying mechanism is not suitable for meeting these different security requirements. LEAP+ supports the establishment of four types of keys for each sensor node: an individual key shared with the base station, a pairwise key shared with another sensor node, a cluster key shared with multiple neighboring nodes, and a global key shared by all the nodes in the network. LEAP+ also supports (weak) local source authentication without precluding in-network processing. Our performance analysis shows that LEAP+ is very efficient in terms of computational, communication, and storage costs. We analyze the security of LEAP+ under various attack models and show that LEAP+ is very effective in defending against many sophisticated attacks, such as HELLO flood attacks, node cloning attacks, and wormhole attacks. A prototype implementation of LEAP+ on a sensor network testbed is also described.