Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symmetric keys between two devices. In this paper, we propose a novel decentralized key exchange protocol that guarantees the confidentiality of a key exchange even if an attacker has compromised some of the devices in the network. A central objective of the protocol design was to minimize resource consumption on the individual devices. We evaluate the resource requirements of our protocol in terms of memory requirements, CPU usage and network traffic both through theoretical analysis and through simulations
We present a decentralized key management architecture for wireless sensor networks, covering the as...
A Wireless Sensor Network (WSN) consists of sensor nodes which communicate with each other using wir...
We present a decentralized key management architecture for wireless sensor networks, covering the as...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Abstract—This paper presents the design, implementation and evaluation of an automated method for di...
[[abstract]]To support secure group communications in resource-constrained wireless sensor networks,...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
Abstract—A major issue in many applications of Wireless Sensor Networks (WSNs) is ensuring security....
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WS...
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
We present a decentralized key management architecture for wireless sensor networks, covering the as...
We present a decentralized key management architecture for wireless sensor networks, covering the as...
This paper presents an encryption scheme suitable for direct diffusion protocols. We have calculated...
We present a decentralized key management architecture for wireless sensor networks, covering the as...
A Wireless Sensor Network (WSN) consists of sensor nodes which communicate with each other using wir...
We present a decentralized key management architecture for wireless sensor networks, covering the as...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Abstract—This paper presents the design, implementation and evaluation of an automated method for di...
[[abstract]]To support secure group communications in resource-constrained wireless sensor networks,...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
Abstract—A major issue in many applications of Wireless Sensor Networks (WSNs) is ensuring security....
Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WS...
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
We present a decentralized key management architecture for wireless sensor networks, covering the as...
We present a decentralized key management architecture for wireless sensor networks, covering the as...
This paper presents an encryption scheme suitable for direct diffusion protocols. We have calculated...
We present a decentralized key management architecture for wireless sensor networks, covering the as...
A Wireless Sensor Network (WSN) consists of sensor nodes which communicate with each other using wir...
We present a decentralized key management architecture for wireless sensor networks, covering the as...