Online citations, reference lists, and bibliographies.
← Back to Search

Providing Perfect Forward Secrecy For Location-aware Wireless Sensor Networks

Chi-Tung Chen, Shu-Yan Huang, I. Lin
Published 2012 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks. In the previous schemes, symmetric cryptography is the most common method used in sensor nodes. How to distribute keys into every sensor node is an important issue in many applications for hierarchical sensor networks. Once adversaries compromise a sensor node, they can obtain all information from the sensor’s memory, such as keying material. The revocation of compromised sensor nodes is also a necessary but troublesome operation. These compromised sensor nodes may lead to the compromise of the entire network. In this article, we present an efficient approach to establish security links between each sensor node/cluster head and its neighbor/member. Our scheme only requires small memory size for each cluster head and sensor node, and it can also ensure perfect forward secrecy via changing session key in every transmission.
This paper references
An effective key management scheme for heterogeneous sensor networks
Xiaojiang Du (2007)
Energy analysis of public-key cryptography for wireless sensor networks
Arvinderpal Wander (2005)
Secure protocols for hierarchical wireless sensor networks
LB Oliveira (2005)
A pairwise key pre-distribution scheme for wireless sensor networks
W. Du (2003)
Access control in wireless sensor networks
Yun Zhou (2007)
Secure positioning of wireless devices with application to sensor networks
Srdjan Capkun (2005)
Identity-Based Cryptosystems and Signature Schemes
A. Shamir (1984)
LEAP: efficient security mechanisms for large-scale distributed sensor networks
S. Zhu (2003)
: efficient security mechanisms for large - scale distributed sensor networks
Y Zhang Y Zhou
Efficient signature generation for smart card
CP Schnorr (1991)
SPINS : Security Protocols for Sensor Networks
Jeffery Undercoffer (2002)
efficient security mechanisms for large - scale distributed sensor networks
S Setia (2006)
Energy-efficient communication protocol for wireless microsensor networks
W. Heinzelman (2000)
Secure routing in wireless sensor networks: attacks and countermeasures
C. Karlof (2003)
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Xuefei Cao (2008)
Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
Y. Hu (2001)
A Broadcast-Encryption-Based Key Management Scheme for Dynamic Multicast Communications
C. Chang (2007)
Key management for long-lived sensor networks in hostile environments
Michael Chorzempa (2007)
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
D. Liu (2004)
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
M. Younis (2006)
A pairwise key predistribution scheme for wireless sensor networks
W. Du (2005)
CP Schnorr , Efficient signature generation for smart card
Xi Cao (1991)
The Sybil attack in sensor networks: analysis & defenses
J. Newsome (2004)
Providing perfect forward secrecy for location-aware wireless sensor networks
Efficient signature generation by smart cards
C. Schnorr (2004)
Security Proofs for Identity-Based Identification and Signature Schemes
M. Bellare (2004)
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
Dynamic fine-grained localization in Ad-Hoc networks of sensors
A. Savvides (2001)
Packet leashes: a defense against wormhole attacks in wireless networks
Y. Hu (2003)
Security Proofs for Identity-Based Identification and Signature Schemes
M. Bellare (2008)
SecLEACH - On the security of clustered sensor networks
Leonardo B. Oliveira (2007)
Combinatorial Optimization of Group Key Management
M. Eltoweissy (2004)
Secure localization and authentication in ultra-wideband sensor networks
Yanchao Zhang (2006)
identity - based multi - user broadcast authentication in wireless sensor networks
Xi Cao (2008)
Random key predistribution schemes for sensor networks
H. Chan (2003)
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Yanchao Zhang (2006)
Adaptive security design with malicious node detection in cluster-based sensor networks
M. Hsieh (2007)
LHA-SP: secure protocols for hierarchical wireless sensor networks
Leonardo B. Oliveira (2005)

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar