Secure communications over insecure channels
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Location dependent key management using random key-predistribution in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Probability and Random Processes For EE's (3rd Edition)
Probability and Random Processes For EE's (3rd Edition)
IEEE Transactions on Wireless Communications
Deterministic key predistribution schemes for distributed sensor networks
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
New directions in cryptography
IEEE Transactions on Information Theory
Dynamic key management in sensor networks
IEEE Communications Magazine
A pairwise key establishment scheme for heterogeneous sensor networks
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
Key Refreshing in Wireless Sensor Networks
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
ACM Transactions on Sensor Networks (TOSN)
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
Tree-based key predistribution for wireless sensor networks
Wireless Networks
Secret keys from entangled sensor motes: implementation and analysis
Proceedings of the third ACM conference on Wireless network security
Information Processing Letters
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
Information Sciences: an International Journal
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes
ACM Transactions on Sensor Networks (TOSN)
A misused key detection mechanism using the token in wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
An approach for node identification and key management in sensor grids
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies
Distinct difference configurations: multihop paths and key predistribution in sensor networks
IEEE Transactions on Information Theory
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Tree based protocol for key management in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
International Journal of Sensor Networks
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A generic evaluation method for key management schemes in wireless sensor network
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Journal of Network and Computer Applications
Research challenges towards the Future Internet
Computer Communications
A secure and anonymous cooperative sensing protocol for cognitive radio networks
Proceedings of the 4th international conference on Security of information and networks
A half-key key management scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
Authenticating hard decision sensing reports in cognitive radio networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A dynamic TDMA based scheme for securing query processing in WSN
Wireless Networks
A light-weighted misused key detection in wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
A novel key management scheme for wireless embedded systems
ACM SIGAPP Applied Computing Review
Energy efficient authentication strategies for network coding
Concurrency and Computation: Practice & Experience
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Improved multi-precision squaring for low-end RISC microcontrollers
Journal of Systems and Software
On the role of expander graphs in key predistribution schemes for wireless sensor networks
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
Background transfer method for ubiquitous computing
NSS'12 Proceedings of the 6th international conference on Network and System Security
Review: Dynamic key management in wireless sensor networks: A survey
Journal of Network and Computer Applications
Large scale wireless sensor networks with multi-level dynamic key management scheme
Journal of Systems Architecture: the EUROMICRO Journal
Analysing m-commerce research: technology, applications and research themes
International Journal of Mobile Communications
Hi-index | 0.30 |
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these networks. Sensor nodes used to form these networks are resource-constrained, which make security applications a challenging problem. Efficient key distribution and management mechanisms are needed besides lightweight ciphers. Many key establishment techniques have been designed to address the tradeoff between limited memory and security, but which scheme is the most effective is still debatable. In this paper, we provide a survey of key management schemes in wireless sensor networks. We notice that no key distribution technique is ideal to all the scenarios where sensor networks are used; therefore the techniques employed must depend upon the requirements of target applications and resources of each individual sensor network.