Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, called parasitic adversary, who seeks to exploit sensor networks by obtaining measurements in an unauthorized way. As a countermeasure, we first employ a randomized key refreshing: with low communication cost, it aims at confining (but not eliminating) the effects of the adversary. Moreover, our low-complexity solution, GossiCrypt, leverages on the large scale of sensor networks to protect data confidentiality, efficiently and effectively. GossiCrypt applies symmetric key encryption to data at their source nodes; and it applies re-encryption at a randomly chosen subset...
Quantifying Eavesdropping Vulnerability in Sensor Networks With respect to security, sensor networks...
Secure communication is a necessity for some wireless sensor network (WSN) applications. However, th...
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
A distributed Wireless Sensor Network (WSN) is a collection of low-end devices with wireless message...
Abstract-We give, for the first time, a precise tablishing secure pair-wise communications is very m...
Among the various possible threats in the WSN’s, like node failure, data security, etc., we are pres...
With the widely deployment of wireless sensor networks in smart industrial systems, lots of unauthor...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
Wireless sensor networks consist of a large amount of sensor nodes, small low-cost wireless computin...
The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this expansi...
Abstract. Key pre-distribution schemes are a favored solution for es-tablishing secure communication...
Eavesdroppers can easily intercept the data transmitted in a wireless sensor network (WSN) because o...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Quantifying Eavesdropping Vulnerability in Sensor Networks With respect to security, sensor networks...
Secure communication is a necessity for some wireless sensor network (WSN) applications. However, th...
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
A distributed Wireless Sensor Network (WSN) is a collection of low-end devices with wireless message...
Abstract-We give, for the first time, a precise tablishing secure pair-wise communications is very m...
Among the various possible threats in the WSN’s, like node failure, data security, etc., we are pres...
With the widely deployment of wireless sensor networks in smart industrial systems, lots of unauthor...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
Wireless sensor networks consist of a large amount of sensor nodes, small low-cost wireless computin...
The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this expansi...
Abstract. Key pre-distribution schemes are a favored solution for es-tablishing secure communication...
Eavesdroppers can easily intercept the data transmitted in a wireless sensor network (WSN) because o...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Quantifying Eavesdropping Vulnerability in Sensor Networks With respect to security, sensor networks...
Secure communication is a necessity for some wireless sensor network (WSN) applications. However, th...
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless...