Filters








41 Hits in 5.1 sec

Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs [article]

Maura B. Paterson, Douglas R. Stinson
2014 arXiv   pre-print
A communication graph G can be specified to indicate which pairs of users should be able to compute keys. We determine necessary and sufficient conditions for schemes of this type to be secure.  ...  We study a method for key predistribution in a network of n users where pairwise keys are computed by hashing users' IDs along with secret information that has been (pre)distributed to the network users  ...  A general model for ID-based one-way-function KPS In an ID-based one-way-function key predistribution scheme (or IOS), pairwise keys are constructed by hashing public information along with secret information  ... 
arXiv:1403.1468v1 fatcat:4473nqxuove33h7rbzusfcsm64

Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs

Maura B. Paterson, Douglas R. Stinson
2015 Journal of Mathematical Cryptology  
AbstractWe study a method for key predistribution in a network of  ...  A general model for ID-based one-way-function KPS In an ID-based one-way-function key predistribution scheme (or IOS), pairwise keys are constructed by hashing public information along with secret information  ...  Another approach, due to Lee and Stinson [7] , is called an ID-based one-way-function key predistribution scheme, also known as IOS.  ... 
doi:10.1515/jmc-2014-0031 fatcat:2lnwxcqr4ncwlku5udgipubkfi

A canonical seed assignment model for key predistribution in wireless sensor networks

Patrick Tague, Radha Poovendran
2007 ACM transactions on sensor networks  
The analytical results can be used to determine the average or worst-case connectivity or resilience to node capture for a key predistribution scheme.  ...  Furthermore, we demonstrate the design of new key predistribution schemes and the inclusion of existing schemes in the canonical model.  ...  The ID-based one-way scheme of Lee and Stinson [2004] can be described in the canonical model by the seed assignment scheme (P ios , ios ) where the assignment distribution has support ios = {r L+1}.  ... 
doi:10.1145/1281492.1281494 fatcat:lar26rireraxbhuz7jij7xkkxi

A survey of key management schemes in wireless sensor networks

Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, Michael Galloway
2007 Computer Communications  
In this paper, we provide a survey of key management schemes in wireless sensor networks.  ...  Many key establishment techniques have been designed to address the tradeoff between limited memory and security, but which scheme is the most effective is still debatable.  ...  Fortunately, Zhu, Setia, and Jajodia [6] have designed a scheme called One-Way Key Chain-Based Authentication for defeating this attack totally.  ... 
doi:10.1016/j.comcom.2007.04.009 fatcat:h4dpize62nbkhpbnziusau4l4e

On the gradual deployment of random pairwise key distribution schemes

Osman Yagan, Armand M. Makowski
2011 2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks  
The pairwise key distribution scheme of Chan et al. is a randomized key predistribution scheme which enables cryptographic protection in wireless sensor networks (WSNs).  ...  We also discuss briefly the relation between the scheme parameter and the amount of memory that each sensor needs to spare for storing their keys.  ...  The pairwise key ★ , = [Id |Id | |ℓ , ( ) ] is constructed and inserted in the memory modules of both nodes and .  ... 
doi:10.1109/wiopt.2011.5930024 dblp:conf/wiopt/YaganM11 fatcat:nafdheyxe5f6vdsce6wn4pvqba

A Survey On Security In Wireless Sensor Network

Faris Fazlic, Seyed Ali Hashemi, Ahmed Aletic, Ali Abd Almisreb, Syamimi Mohd Norzeli, Norashidah Md Din
2019 Southeast Europe Journal of Soft Computing  
In this paper we present a survey of security issues in WSNs, address the state of the art in research on sensor network security, and discuss some future directions for research.  ...  There is numerous applications for wireless sensor networks, and security is vital for many of them.  ...  General speaking, many traditional binary-tree-based group key management schemes and broadcast approaches, such as logical key hierarchy, one-way function chain tree, and subset-cover broadcast encryption  ... 
doi:10.21533/scjournal.v8i1.174 fatcat:5qi4jzi6g5cfldjyuhyf2qku7u

A survey on peer-to-peer key management for mobile ad hoc networks

Johann Van Der Merwe, Dawoud Dawoud, Stephen McDonald
2007 ACM Computing Surveys  
-peer key management, pairwise key management ACM Reference Format: van der Merwe, J., Dawoud, D., and McDonald, S. 2007. A survey on peer-to-peer key management for mobile ad hoc networks.  ...  The protocols are subdivided into groups based on their design strategy or main characteristic. The article discusses and provides comments on the strategy of each group separately.  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers for their insightful comments and suggestions.  ... 
doi:10.1145/1216370.1216371 fatcat:rcauxrgg7vgurhyibno5cqms6m

Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation

D. Westhoff, J. Girao, M. Acharya
2006 IEEE Transactions on Mobile Computing  
We consider the risk of corrupted sensor nodes by proposing a key predistribution algorithm that limits an attacker's gain and show how key predistribution and a key-ID sensitive "going down" routing protocol  ...  It mainly needs to support reverse multicast traffic to one particular destination in a multihop manner. For such a communication pattern, end-to-end encryption is a challenging problem.  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers for their careful reading and insightful comments that have helped improve the presentation of this paper.  ... 
doi:10.1109/tmc.2006.144 fatcat:b5hvzgt7pfextjrumx6bccblra

A Survey on Wireless Sensor Network Security [article]

Jaydip Sen
2010 arXiv   pre-print
A brief discussion on the future direction of research in WSN security is also included.  ...  Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications.  ...  Lee and Stinson proposed two combinatorial design theory based deterministic schemes: ID-based one-way function scheme (IOS) and deterministic multiple space Bloms' scheme (DMBS) [124] .  ... 
arXiv:1011.1529v1 fatcat:syvw3mhclfgclktanjz6ynkd7m

A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks

Yue Li, Dehua Chen, Wei Li, Gaoli Wang, Paul Smith
2013 International Journal of Distributed Sensor Networks  
The AGKA protocol reduces the high cost public-key operations at the sensor side and replaces them with efficient symmetric-key based operations.  ...  In this paper, the design of a new hybrid Authenticated Group Key Agreement (AGKA) protocol is described for WSNs.  ...  This research is also supported by the Fundamental Research Funds for the Central Universities.  ... 
doi:10.1155/2013/716265 fatcat:e25k7g5k6bfxngok4qu2k5a2ra

The DUNE-ALUGrid Module [article]

Martin Alkämper, Andreas Dedner, Robert Klöfkorn, Martin Nolte
2015 arXiv   pre-print
The main changes include user defined load balancing, parallel grid construction, and an redesign of the 2d grid which can now also be used for parallel computations.  ...  The original ALUGrid library is widely used within the DUNE community due to its good parallel performance for problems requiring local adaptivity and dynamic load balancing.  ...  Based on this implementation it is easy to experiment with the wide range of options Zoltan provides to optimize the partitioning algorithm for a given application.  ... 
arXiv:1407.6954v3 fatcat:l2e4ej6nqrbmxfndcdh6ojbkb4

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ...  Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  ID based one-way function scheme (IOS) [12] distributes dedicated pair-wise keys according to connected r-regular graphs which have edge decomposition into star-like subgraphs.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

On handling insider attacks in wireless sensor networks

Christoph Krauß, Markus Schneider, Claudia Eckert
2008 Information Security Technical Report  
For ensuring the functionality of a sensor network, especially in malicious environments, security mechanisms are essential for all sensor networks.  ...  By compromising a sensor node, an adversary gets access to all data stored on the node, such as cryptographic keys.  ...  This attack is based on the fact that current key management schemes (e.g., the random key predistribution and pairwise key predistribution schemes [84, 43, 116, 155, 76, 215] ) store a key pool on the  ... 
doi:10.1016/j.istr.2008.10.011 fatcat:d4bh3jwjp5c7vg6fcn7q5b45ly

Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks

Shouhuai Xu, Srdjan Čapkun
2008 ACM Transactions on Privacy and Security  
This has consequences for both researchers and practitioners, who do not have a clear idea how to compare the schemes and how to select a scheme for a given application.  ...  In this article, we present a framework that helps in understanding and comparing schemes for secure bootstrapping of MANETs.  ...  ACKNOWLEDGMENT We thank the anonymous reviewers for their insightful comments that helped improve the article.  ... 
doi:10.1145/1410234.1410236 fatcat:da3gpmiadjbvhcpfpu4lvh3fma

Autoregressive integrated moving average model–based secure data aggregation for wireless sensor networks

Hongtao Song, Shanshan Sui, Qilong Han, Hui Zhang, Zaiqiang Yang
2020 International Journal of Distributed Sensor Networks  
In this article, we propose a novel secure data aggregation solution based on autoregressive integrated moving average model, a time series analysis technique, to prevent private data from being learned  ...  This fact calls for special requirements for network protocol design, security assessment models, and energy-efficient algorithms.  ...  iD Hongtao Song https://orcid.org/0000-0001-6132-5843  ... 
doi:10.1177/1550147720912958 fatcat:7phygzbg7nhd5hbh4m5ujphyl4
« Previous Showing results 1 — 15 out of 41 results