Online citations, reference lists, and bibliographies.
← Back to Search

Providing Perfect Forward Secrecy For Location-aware Wireless Sensor Networks

Chi-Tung Chen, Shu-Yan Huang, I. Lin
Published 2012 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks. In the previous schemes, symmetric cryptography is the most common method used in sensor nodes. How to distribute keys into every sensor node is an important issue in many applications for hierarchical sensor networks. Once adversaries compromise a sensor node, they can obtain all information from the sensor’s memory, such as keying material. The revocation of compromised sensor nodes is also a necessary but troublesome operation. These compromised sensor nodes may lead to the compromise of the entire network. In this article, we present an efficient approach to establish security links between each sensor node/cluster head and its neighbor/member. Our scheme only requires small memory size for each cluster head and sensor node, and it can also ensure perfect forward secrecy via changing session key in every transmission.
This paper references
10.1016/j.adhoc.2006.05.012
An effective key management scheme for heterogeneous sensor networks
Xiaojiang Du (2007)
10.1109/PERCOM.2005.18
Energy analysis of public-key cryptography for wireless sensor networks
Arvinderpal Wander (2005)
Secure protocols for hierarchical wireless sensor networks
LB Oliveira (2005)
10.1145/948109.948118
A pairwise key pre-distribution scheme for wireless sensor networks
W. Du (2003)
10.1016/j.adhoc.2006.05.014
Access control in wireless sensor networks
Yun Zhou (2007)
10.1109/INFCOM.2005.1498470
Secure positioning of wireless devices with application to sensor networks
Srdjan Capkun (2005)
10.1007/3-540-39568-7_5
Identity-Based Cryptosystems and Signature Schemes
A. Shamir (1984)
10.1145/948109.948120
LEAP: efficient security mechanisms for large-scale distributed sensor networks
S. Zhu (2003)
: efficient security mechanisms for large - scale distributed sensor networks
Y Zhang Y Zhou
Efficient signature generation for smart card
CP Schnorr (1991)
SPINS : Security Protocols for Sensor Networks
Jeffery Undercoffer (2002)
efficient security mechanisms for large - scale distributed sensor networks
S Setia (2006)
10.1109/HICSS.2000.926982
Energy-efficient communication protocol for wireless microsensor networks
W. Heinzelman (2000)
10.1109/SNPA.2003.1203362
Secure routing in wireless sensor networks: attacks and countermeasures
C. Karlof (2003)
10.1016/j.comcom.2007.10.017
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Xuefei Cao (2008)
Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
Y. Hu (2001)
10.4108/INFOSCALE.2007.958
A Broadcast-Encryption-Based Key Management Scheme for Dynamic Multicast Communications
C. Chang (2007)
10.1016/j.comcom.2007.02.022
Key management for long-lived sensor networks in hostile environments
Michael Chorzempa (2007)
10.1145/586110.586117
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
10.1145/1027794.1027800
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
D. Liu (2004)
10.1109/TPDS.2006.106
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
M. Younis (2006)
10.1145/1065545.1065548
A pairwise key predistribution scheme for wireless sensor networks
W. Du (2005)
CP Schnorr , Efficient signature generation for smart card
Xi Cao (1991)
10.1145/984622.984660
The Sybil attack in sensor networks: analysis & defenses
J. Newsome (2004)
Providing perfect forward secrecy for location-aware wireless sensor networks
(2012)
10.1007/BF00196725
Efficient signature generation by smart cards
C. Schnorr (2004)
10.1007/978-3-540-24676-3_17
Security Proofs for Identity-Based Identification and Signature Schemes
M. Bellare (2004)
10.1016/j.csi.2008.05.014
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
10.1145/381677.381693
Dynamic fine-grained localization in Ad-Hoc networks of sensors
A. Savvides (2001)
10.1109/INFCOM.2003.1209219
Packet leashes: a defense against wormhole attacks in wireless networks
Y. Hu (2003)
10.1007/s00145-008-9028-8
Security Proofs for Identity-Based Identification and Signature Schemes
M. Bellare (2008)
10.1016/j.sigpro.2007.05.016
SecLEACH - On the security of clustered sensor networks
Leonardo B. Oliveira (2007)
10.1023/B:JONS.0000015697.38671.ec
Combinatorial Optimization of Group Key Management
M. Eltoweissy (2004)
10.1109/JSAC.2005.863855
Secure localization and authentication in ultra-wideband sensor networks
Yanchao Zhang (2006)
identity - based multi - user broadcast authentication in wireless sensor networks
Xi Cao (2008)
10.1109/SECPRI.2003.1199337
Random key predistribution schemes for sensor networks
H. Chan (2003)
10.1109/JSAC.2005.861382
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Yanchao Zhang (2006)
10.1016/j.comcom.2007.04.008
Adaptive security design with malicious node detection in cluster-based sensor networks
M. Hsieh (2007)
10.1109/INM.2005.1440767
LHA-SP: secure protocols for hierarchical wireless sensor networks
Leonardo B. Oliveira (2005)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar