A Triplet Key Approach for Confidentiality in Dynamic Wireless Sensor Networks
Abstract
Keywords
Full Text:
PDFReferences
P. F. Oliveira, R. A. Costa, and J. Barros, “Mobile secret key distribution with network coding,” presented at the Int. Conf. Security Cryptography,Jul. 2007.
P. F. Oliveira and J. Barros, “Network coding protocols for secret key distribution,” in Proc. Int. Symp. Information Security, Nov. 2007, pp.1718–1733.
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili,“A pairwise key predistribution scheme for wireless sensor networks,”ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228–258, 2005.
D. Malan, M. Welsh, and M. Smith, “A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,” presented at the 1st IEEE Int. Conf. Sensor and Ad Hoc Communications and
Networks, Santa Clara, CA, Oct. 2004. [Online]. Available: citeseer. ist.psu.edu/malan04publickey.html.
A. Perrig, R. Szewczyk, J. D. Tygar, V.Wen, and D. E. Culler, “SPINS: Security protocols for sensor networks,” Wireless Netw., vol. 8, no. 5, pp. 521–534, 2002.
L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proc. 9th ACMConf. Computer and Communications Security, New York, 2002, pp. 41–47.
S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient security mechanisms for large-scale distributed sensor networks,” in Proc. 10th ACM Conf. Computer and Communications Security, New York, 2003, pp. 62–72.
C. Fragouli, J.-Y. L. Boudec, and J. Widmer, “Network coding: An instant primer,” Proc. SIGCOMM Comput. Commun. Rev., vol. 36, no. 1, pp. 63–68, 2006.
S. Deb, M. Effros, T. Ho, D. Karger, R. Koetter, D. Lun, M. Medard, and N. Ratnakar, “Network coding for wireless applications: A brief tutorial,” presented at the IWWAN, London, U.K., May 2005.
K. Bhattad and K. Narayanan, “Weakly secure network coding,” presented at the 1st Workshop on Network Coding, Theory, and Applications, Riva del Garda, Italy, 2005.
F. Stajano and R. J. Anderson, B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, Eds., “The resurrecting duckling: Security issues for ad-hoc wireless networks,” in Security Protocols Workshop, 1999, vol. 1796, pp. 172–194, Lecture Notes Comput. Sci., Springer.
F. Stajano, Security for Ubiquitous Computing. New York: Wiley,Feb. 2002. [Online]. Available: http://www.cl.cam.ac.uk/fms27/secubicomp/.
G. S. Vernam, “Cipher printing telegraph systems for secret wire and radio telegraphic communications,” J. Amer. Inst. Elect. Eng., vol. XLV, pp. 109–115, 1926.
A. Francillon and C. Castelluccia, “TinyRNG: A cryptographic random number generator for wireless sensors network nodes,” presented at the 5th Int. Symp. Modeling and Optimization Mobile, Ad Hoc, and Wireless Networks(WiOpt), 2007.
C. Karlof and D.Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Ad Hoc Netw., vol. 1, no. 2–3, pp. 293–315, 2003.
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, “Byzantine modification detection in multicast networks using randomized network coding,” presented at the IEEE Int. Symp. Information Theory, Chicago, IL, Jul. 2004.
D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, “Extracting secret keys from integrated circuits,” IEEE Trans. Very Large Scale Integr. Syst., vol. 13, no. 10, pp. 1200–1205, Oct.2005.
C. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, 1949.
B. Schneier, Appl. Cryptography. New York: Wiley, 1994. Oliveira and barros: network coding approach to secret key distribution 423
A. Becher, Z. Benenson, and M. Dornseif, J. A. Clark, R. F. Paige, F. Polack, and P. J. Brooke, Eds., “Tampering with motes: Real-world physical attacks on wireless sensor networks,” in Proc. 3rd Int. Conf. Security Pervasive Computing., York, U.K., Apr. 18–21, 2006, vol. 3934, pp. 104–118, Springer, 2006, ser. Lecture Notes Comput. Sci.
L. Lima, M. Médard, and J. Barros, “Random linear network coding: A free cipher?,” presented at the IEEE Int. Symp. Information Theory, Jun. 2007
W. Stallings, Cryptography and network security : principles and practice, Prentice Hall, 1999.] P. van Oorschot A. Menezes and S. Vanstone, Handbook of Applied Cryptography,,CRC Press, 1997.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.