Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Energy-Efficiency of VLSI Caches: A Comparative Study
VLSID '97 Proceedings of the Tenth International Conference on VLSI Design: VLSI in Multimedia Applications
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
Flexible power scheduling for sensor networks
Proceedings of the 3rd international symposium on Information processing in sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A two-tier heterogeneous mobile Ad Hoc network architecture and its load-balance routing problem
Mobile Networks and Applications
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Simulating the power consumption of large-scale sensor network applications
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Mobile Telemedicine Sensor Networks with Low-Energy Data Query and Network Lifetime Considerations
IEEE Transactions on Mobile Computing
The emergence of networking abstractions and techniques in TinyOS
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Accurate prediction of power consumption in sensor networks
EmNets '05 Proceedings of the 2nd IEEE workshop on Embedded Networked Sensors
A decentralized approach to secure management of nodes in distributed sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
On supporting distributed collaboration in sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
IEEE Communications Magazine
Towards a Lightweight Security Solution for User-Friendly Management of Distributed Sensor Networks
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Clone wars: Distributed detection of clone attacks in mobile WSNs
Journal of Computer and System Sciences
Hi-index | 0.00 |
Our research aims to address the challenging security issues in Wireless Sensor and Actuator Networks (WSANs), a special type of Wireless Sensor Networks (WSNs). Since WSANs have specific network constraints and data transmission requirements compared to general ad hoc networks and other wireless/wired networks, we propose to seamlessly integrate WASN security with a ripple-zone (RZ)-based routing architecture that is scalable and energy-efficient. In this research, we will also develop a two-level re-keying/re-routing schemes that cannot only adapt to a dynamic network topology but also securely update keys for each data transmission session. Moreover, to provide the security for the in-networking processing such as data aggregation in WSANs, we define a multiple-key management scheme in conjunction with our proposed Ripple-Zone routing architecture. Extensive simulations and hardware experiments have been conducted to verify the energy-efficiency and security performance of our security scheme for WSANs.