2014
DOI: 10.1145/2636344
|View full text |Cite
|
Sign up to set email alerts
|

Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols

Abstract: Key management is required for basic security services of confidentiality, integrity, and data source authentication. Wireless sensor networks (WSNs) are a challenging environment to provide such services due to the resource constraints and the increased likelihood of nodes to be captured. Various key management techniques were proposed that trade off resilience to node capture and overhead in terms of communication and memory.We identify the main factors influencing the design space of key management protocol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…Moreover, due to low energy consumption and limited memory, it is hard to implement sophisticated and complex algorithms. The precision farming services such as IoT-enabled location information and location-based services are exposed to hackers that may use this information for device capturing [141,142,144]. Attackers attack the IoT device and take out cryptographic implementations.…”
Section: Securitymentioning
confidence: 99%
“…Moreover, due to low energy consumption and limited memory, it is hard to implement sophisticated and complex algorithms. The precision farming services such as IoT-enabled location information and location-based services are exposed to hackers that may use this information for device capturing [141,142,144]. Attackers attack the IoT device and take out cryptographic implementations.…”
Section: Securitymentioning
confidence: 99%
“…Random (s-)intersection graphs have been used to model secure wireless sensor networks [12][13][14][15][16][17][18][19][20][21][22], wireless frequency hopping [22], epidemics in human populations [1,2], small-world networks [39], trust networks [40,41], social networks [2][3][4][5][6] such as collaboration networks [2][3][4] and common-interest networks [5,6]. Random intersection graphs also motivated Beer et al [42,43] to introduce a general concept of vertex random graphs that subsumes any graph model where random features are assigned to vertices, and edges are drawn based on deterministic relations between the features of the vertices.…”
mentioning
confidence: 99%
“…Andrew Newell et.al. [27]focused on ensure secrecy and reliability of key establishment. Secrecy ensures that only the two parties establishing the key have knowledge about the key.…”
Section: Lee and Stinsonmentioning
confidence: 99%