How to construct random functions
Journal of the ACM (JACM)
An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Next century challenges: mobile networking for “Smart Dust”
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Directed diffusion for wireless sensor networking
IEEE/ACM Transactions on Networking (TON)
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Supporting Aggregate Queries Over Ad-Hoc Wireless Sensor Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Computation hierarchy for in-network processing
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Maximum lifetime routing in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Connectivity properties of secure wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
Wireless sensor networks: leveraging the virtual infrastructure
IEEE Network: The Magazine of Global Internetworking
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
ACM Transactions on Information and System Security (TISSEC)
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Key Predistribution Schemes Using Codes in Wireless Sensor Networks
Information Security and Cryptology
Distributed data source verification in wireless sensor networks
Information Fusion
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
ACM Transactions on Sensor Networks (TOSN)
Mobility and cooperation to thwart node capture attacks in MANETs
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Attack-resilient random key distribution scheme for distributed sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Hierarchies of keys in secure multicast communications
Journal of Computer Security
The smallville effect: social ties make mobile networks more secure against node capture attack
Proceedings of the 8th ACM international workshop on Mobility management and wireless access
Location privacy and resilience in wireless sensor networks querying
Computer Communications
Associative routing for wireless sensor networks
Computer Communications
Security measures in wired and wireless networks
ISIICT'09 Proceedings of the Third international conference on Innovation and Information and Communication Technology
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
ISC'12 Proceedings of the 15th international conference on Information Security
A new class of Hash-Chain based key pre-distribution schemes for WSN
Computer Communications
Hi-index | 0.00 |
A distributed Wireless Sensor Network (WSN) is a collection of low-end devices with wireless message exchange capabilities. Due to the scarcity of hardware resources, the lack of network infrastructures, and the threats to security, implementing secure pair-wise communications among any pair of sensors is a challenging problem in distributed WSNs. In particular, memory and energy consumption as well as resilience to sensor physical compromise are the most stringent requirements. In this paper, we introduce a new threat model to communications confidentiality in WSNs, the smart attacker model. Under this new, more realistic model, the security features of previously proposed schemes decrease drastically. We then describe a novel pseudo-random key pre-deployment strategy ESP that combines all the following properties: (a) it supports an energy-efficient key discovery phase requiring no communications; (b) it provides node to node authentication; (c) it is highly resistant to the smart attacker. We provide both asymptotic results and extensive simulations of the schemes that are being proposed.