Part 2: Data SecurityInternational audienceThe security of the Multiple-Key Blom’s (MKB) key agreement scheme is analysed. We considered how the scheme may be broken by a very powerful and well resourced adversary who is able to capture any number of nodes to extract all the sensitive keying material. We showed that by choosing suitable keying parameters, the captured private keys cannot be used directly to break the scheme. Each captured key must first be correctly associated with the public key and master key used to compute it. The chances of finding this private-public-master-key association (PPMka) can be made extremely small and would require the attacker to capture a very large number of nodes, or try an extremely large number of pos...
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy ...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authen-ti...
Abstract. Security requirements are very pressing in distributed sensor net-works due to exploitatio...
We propose a new authenticated key agreement scheme based on Blom’s scheme, but using multiple maste...
Abstract: We propose a new authenticated key agreement scheme based on Blom’s scheme, but using mult...
In wireless sensor networks, the messages between pairs of communicating nodes are open to eavesdrop...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
This paper contributes to the challenging field of security for wireless sensor networks by introduc...
A sensor network key distribution scheme for hierarchical sensor networks was recently proposed by C...
Part 2: Security EngineeringInternational audienceIn a wireless sensor network (WSN), in order to pr...
In this chapter we study the security and key establishment schemes for distributed sensor networks ...
Public key operations were considered impractical for wireless sensor networks due to their high com...
Abstract Three closely related polynomial‐based group key pre‐distribution schemes have recently bee...
Enabling security services such as encryption and authentication in distributed sensor networks (DSN...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authentic...
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy ...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authen-ti...
Abstract. Security requirements are very pressing in distributed sensor net-works due to exploitatio...
We propose a new authenticated key agreement scheme based on Blom’s scheme, but using multiple maste...
Abstract: We propose a new authenticated key agreement scheme based on Blom’s scheme, but using mult...
In wireless sensor networks, the messages between pairs of communicating nodes are open to eavesdrop...
[[abstract]]To achieve security in wireless sensor networks, it is important to be able to encrypt a...
This paper contributes to the challenging field of security for wireless sensor networks by introduc...
A sensor network key distribution scheme for hierarchical sensor networks was recently proposed by C...
Part 2: Security EngineeringInternational audienceIn a wireless sensor network (WSN), in order to pr...
In this chapter we study the security and key establishment schemes for distributed sensor networks ...
Public key operations were considered impractical for wireless sensor networks due to their high com...
Abstract Three closely related polynomial‐based group key pre‐distribution schemes have recently bee...
Enabling security services such as encryption and authentication in distributed sensor networks (DSN...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authentic...
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy ...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authen-ti...
Abstract. Security requirements are very pressing in distributed sensor net-works due to exploitatio...