Summary cache: a scalable wide-area Web cache sharing protocol
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A Concrete Security Treatment of Symmetric Encryption
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
OCB: A block-cipher mode of operation for efficient authenticated encryption
ACM Transactions on Information and System Security (TISSEC)
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Group-based key pre-distribution in wireless sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Telos: enabling ultra-low power wireless research
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
Secure sensor network routing: a clean-slate approach
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Designing a secure reliable file system for sensor networks
Proceedings of the 2007 ACM workshop on Storage security and survivability
The BikeNet mobile sensing system for cyclist experience mapping
Proceedings of the 5th international conference on Embedded networked sensor systems
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
Key management and secure software updates in wireless process control environments
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Comprehensible security synthesis for wireless sensor networks
Proceedings of the 3rd international workshop on Middleware for sensor networks
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks
Proceedings of the second ACM conference on Wireless network security
Auxiliary channel Diffie-Hellman encrypted key-exchange authentication
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
A hybrid security protocol for sensor networks
International Journal of Communication Networks and Distributed Systems
Wired and wireless sensor networks for industrial applications
Microelectronics Journal
A secure ubiquitous sensor network with Dragon
Proceedings of the 2009 International Conference on Hybrid Information Technology
BikeNet: A mobile sensing system for cyclist experience mapping
ACM Transactions on Sensor Networks (TOSN)
An enhanced security architecture for wireless sensor network
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
Security architecture for IEEE 802.15.4-based wireless sensor network
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Towards Secure and Practical MACs for Body Sensor Networks
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Simulated attacks on CAN buses: vehicle virus
AsiaCSN '08 Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks
Copyright protection for digital image in wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks
Proceedings of the 2010 ACM Symposium on Applied Computing
Steel, cast iron and concrete: security engineering for real world wireless sensor networks
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Toward trusted wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
IPFIX for wireless sensors in home networks
WD'09 Proceedings of the 2nd IFIP conference on Wireless days
Flexible key exchange negotiation for wireless sensor networks
Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
Dynamic window based multihop authentication for WSN
Proceedings of the 17th ACM conference on Computer and communications security
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
I2CSec: A secure serial Chip-to-Chip communication protocol
Journal of Systems Architecture: the EUROMICRO Journal
Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A calculus for the analysis of wireless network security protocols
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Security management in Wireless Sensor Networks for healthcare
International Journal of Mobile Communications
A timed calculus for wireless systems
Theoretical Computer Science
Gathering sensor data in home networks with IPFIX
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Energy efficiency of encryption schemes applied to wireless sensor networks
Security and Communication Networks
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
Multihop-Based key management in hierarchical wireless sensor network
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Topological detection on wormholes in wireless ad hoc and sensor networks
IEEE/ACM Transactions on Networking (TON)
Science of Computer Programming
Information Systems and e-Business Management
International Journal of Ad Hoc and Ubiquitous Computing
6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer
Proceedings of the International Workshop on Adaptive Security
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes
International Journal of Critical Computer-Based Systems
Hi-index | 0.00 |
Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay protection. Secure sensor network link layer protocols such as Tiny-Sec [10] and ZigBee [24] enjoy significant attention in the community. However, TinySec achieves low energy consumption by reducing the level of security provided. In contrast, ZigBee enjoys high security, but suffers from high energy consumption. MiniSec is a secure network layer that obtains the best of both worlds: low energy consumption and high security. MiniSec has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication. The latter does not require per-sender state for replay protection and thus scales to large networks. We present a publicly available implementation of MiniSec for the Telos platform, and experimental results demonstrate our low energy utilization.