Recent study has demonstrated that quite a few well-know pairwise key establishment schemes are susceptible to key-swapping collusion attack aiming to subvert crucial applications that require cooperative efforts, e.g., data fusion algorithms, routing protocols, etc. Previous works against this attack have shown their own limitations. To overcome these limitations, we propose a new countermeasure in this paper. Our approach makes good use of symmetric-key cryptographic primitives and a hidden one-way hash chain to avoid unreasonable assumptions and/or costly methods, and guarantee network scalability. The intensive security analysis reveals that the countermeasure eliminates the possibility of the attack under normal conditions with only a ...
Abstract—Wireless Sensor Network(WSN) are consists of large number of low power sensor nodes. Securi...
Public key operations were considered impractical for wireless sensor networks due to their high com...
A sensor network key distribution scheme for hierarchical sensor networks was recently proposed by C...
Random pairwise key pre-distribution schemes have been adopted extensively as a preferred approach t...
Enabling security services such as encryption and authentication in distributed sensor networks (DSN...
Purpose- Random key pre-distribution schemes are vulnerable to collusion attacks. The purpose of thi...
The great majority of processes in distributed sensor networks can only be accomplished via collabor...
Abstract. Random key pre-distribution schemes are vulnerable to col-lusion attacks. In this paper, w...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
Abstract. Key pre-distribution schemes are a favored solution for es-tablishing secure communication...
Abstract. We consider cryptographic key establishment in sensor net-works without PKI or trusted thi...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Random pairwise key pre-distribution schemes have been adopted widely as a favored approach to pairw...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography...
Abstract—Wireless Sensor Network(WSN) are consists of large number of low power sensor nodes. Securi...
Public key operations were considered impractical for wireless sensor networks due to their high com...
A sensor network key distribution scheme for hierarchical sensor networks was recently proposed by C...
Random pairwise key pre-distribution schemes have been adopted extensively as a preferred approach t...
Enabling security services such as encryption and authentication in distributed sensor networks (DSN...
Purpose- Random key pre-distribution schemes are vulnerable to collusion attacks. The purpose of thi...
The great majority of processes in distributed sensor networks can only be accomplished via collabor...
Abstract. Random key pre-distribution schemes are vulnerable to col-lusion attacks. In this paper, w...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
Abstract. Key pre-distribution schemes are a favored solution for es-tablishing secure communication...
Abstract. We consider cryptographic key establishment in sensor net-works without PKI or trusted thi...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Random pairwise key pre-distribution schemes have been adopted widely as a favored approach to pairw...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography...
Abstract—Wireless Sensor Network(WSN) are consists of large number of low power sensor nodes. Securi...
Public key operations were considered impractical for wireless sensor networks due to their high com...
A sensor network key distribution scheme for hierarchical sensor networks was recently proposed by C...