Practical forward secure sequential aggregate signatures
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Efficient Generic Forward-Secure Signatures and Proxy Signatures
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
A New Approach to Secure Logging
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
DISH: Distributed Self-Healing
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
A new approach to secure logging
ACM Transactions on Storage (TOS)
Collaborative authentication in unattended WSNs
Proceedings of the second ACM conference on Wireless network security
Efficient data structures for tamper-evident logging
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Efficient fine-grained data access control in wireless sensor networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Security and privacy in emerging wireless networks
IEEE Wireless Communications
A dynamic security framework for ambient intelligent systems: a smart-home based eHealth application
Transactions on computational science X
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
ACM Transactions on Sensor Networks (TOSN)
Intrusion-resilient integrity in data-centric unattended WSNs
Pervasive and Mobile Computing
ACM Transactions on Information and System Security (TISSEC)
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
Self-healing in unattended wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Authenticating operation-based history in collaborative systems
Proceedings of the 17th ACM international conference on Supporting group work
Hi-index | 0.00 |
Wireless sensors are employed in a wide range of applications. One common feature of many sensor settings is the need to communicate sensed data to some collection point or sink. This communication can be direct (to a mobile collector) or indirect - via other sensors towards a remote sink. In either case, a sensor might not be able to communicate to a sink at will. Instead it might collect data and wait (for a potentially long time) for a signal to upload accumulated data directly. In a hostile setting, a sensor may be compromised and its post-compromise data can be manipulated. One important issue is forward security - how to ensure that precompromise data cannot be manipulated? Since a typical sensor is limited in storage and communication facilities, another issue is how to minimize resource consumption by accumulated data. It turns out that current techniques are insufficient to address both challenges. To this end, we explore the notion of Forward-Secure Sequential Aggregate (FssAgg) authentication Schemes. We consider FssAgg authentication schemes in the contexts of both conventional and public key cryptography and construct a FssAgg MAC scheme and a FssAgg signature scheme, each suitable under different assumptions. This work represents the initial investigation of Forward-Secure Aggregation and, although the proposed schemes are not optimal, we believe it opens a new direction for follow-on research.