In Situ Key Establishment in Large-Scale Sensor Networks
نویسندگان
چکیده
1Department of Basic Courses, Rizhao Polytechnic College, Rizhao, Shandong 276826, China 2Department of Computer Science, University of Texas Pan American, Edinburg, Texas 78539, USA 3Department of Computer Science, The George Washington University, Washington, DC, 20052, USA 4Department of Preventive Medicine and Biometrics, Uniformed Services University of the Health Sciences, Bethesda, MD 20817, USA 5Department of Computer Science and Engineering, University of Minnesota, Minneapolis, Minnesota, USA
منابع مشابه
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملOn the Performance of In-Situ Key Establishment Schemes for Wireless Sensor Networks
Due to its efficiency, symmetric key cryptography is very attractive in sensor networks. A number of key predistribution schemes have been proposed, but the scalability is often constrained by the unavailability of topology information before deployment and the limited storage budget within sensors. Recently, three in-situ key establishment schemes, SBK [13], LKE [14] and iPAK [15], have been p...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملA Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks
— The establishment of pairwise keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of public-key cryptographic techniques for the resource-constrained platforms of sensor networks and also due to vulnerability of physical captures of sensor nodes by an adversary/enemy. In this paper, we propose a new location-adaptive key establishment...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Wireless Comm. and Networking
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009