3
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Node Security in Hierarchical Sensor Networks: Distribution of Functions versus Keys

&
Pages 531-556 | Published online: 05 Oct 2009

References

  • Conti , M. , Di Pietro , R. and Mancini , L. V. 2007 . ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks . Ad Hoc Networks , 5 ( 1 ) : 49 – 62 .
  • Carman , David W. , Kruus , Peter S. and Matt , Brian J. Constraints and approaches for distributed sensor network security . NAI Labs Technical Report #00-010 . 2000 . September
  • Aldar , CF. Chan and Edward , S. Rogers Sr. 2004 . Distributed symmetric key management for mobile ad hoc networks . IEEE INFOCOM , Hong Kong
  • Du , Wenliang , Deng , Jing , Han , Yunghsiang S. and Varshney , Pramod . A pairwise key pre-distribution scheme for wireless sensor networks . Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS) . Washington, DC. andinOctober 27–31
  • Du , W. , Deng , J. , Han , Y. S. , Chen , S. and Varshney , P. 2004 . A key management scheme for wireless sensor networks using deployment knowledge . IEEE INFOCOM , Hong Kong
  • Eschenauer , L. and Gligor , V. D. A key-management scheme for distributed sensor networks . Proceedings of the 9th ACM Conference on Computer and Communications Security . Washington, DC. andinNovember 18–22
  • Karlof , C. , Sastry , N. and Wagner , D. TinySec: A link layer security architecture for wireless sensor networks . Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems . and(SenSys 2004), Baltimore, MD, USA. November 2004
  • Heinzelman , W. , Chandrakasan , A. and Balakrishnan , H. Energy-efficient communication protocols for wireless microsensor networks . Proc. Hawaiian Int'l Conf. on Systems Science .
  • Heinzelman , W. , Chandrakasan , A. and Balakrishnan , H. Energy-efficient communication protocols for wireless microsensor networks . Proc. Hawaiian Int'l Conf. on Systems Science . January 2000
  • Kong , P. , Zerfos , P. , Luo , H. , Lu , S. and Zhang , L. Providing robust and ubiquitous security support for mobile ad-hoc networks . International Conference on Network Protocols (ICNP) . Hawaii
  • Madden , S. R. , Franklin , M. J. , Hellerstein , J. M. and Hong , W. 2002 . TAG: a tiny AGgregation service for ad-hoc sensor networks . OSDI , December Boston
  • Malan , D. , Welsh , M. and Smith , M. 2004 . A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography . IEEE SECON , Santa Clara
  • Perrig , A. , Szewczyk , R. , Wen , V. , Culler , D. and Tygar , J.D. 2001 . SPINS: Security protocols for sensor networks . Proceedings of Mobicom ,
  • Sun , Y. and Ray Liu , K. J. 2004 . Scalable hierarchical access control in secure group communications . IEEE INFOCOM , Hong Kong
  • Sandhu , R. 1993 . Lattice-based access control models . IEEE Computer ,
  • http://www.xbow.com/Products/Wireless_Sensor_Networks.htm
  • http://www.tinyos.net/
  • Ye , F. , Luo , H. , Lu , S. and Zhang , L. 2004 . Statistical en-route filtering of injected false data in sensor networks . INFOCOM , Hong Kong
  • Zhu , S. , Setia , S. and Jajodia , S. LEAP: efficient security mechanisms for large-scale distributed sensor networks . Proceedings of the 10th ACM Conference on Computer and Communication Security . Washington, D.C

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.