Learn More
— End-to-end encryption for wireless sensor networks is a challenging problem. To save the overall energy resources of the network it is agreed that sensed data need to be consolidated and aggregated on their way to the final destination. We present an approach that (1) conceals sensed data end-to-end, by (2) still providing efficient in-network data(More)
Routing in wireless sensor networks is different from that in commonsense mobile ad-hoc networks. It mainly needs to support reverse multicast traffic to one particular destination in a multihop manner. For such a communication pattern, end-to-end encryption is a challenging problem. To save the overall energy resources of the network, sensed data needs to(More)
— In-network data aggregation is a popular technique for reducing the energy consumption tied to data transmission in a multi-hop wireless sensor network. However, data aggregation in untrusted or even hostile environments becomes problematic when end-to-end privacy between sensors and the sink is desired. In this paper we revisit and investigate the(More)
There are two problem areas of the current Internet to be solved in Future Internet scenarios – security and putting the user back in control despite the move to the Internet of things. With this in mind, we address problems associated with the diversifying of the Internet towards an Internet of Things, and with increased ways to be reachable, whether the(More)
11 In wireless sensor networks there is a need to securely store monitored data in a distributed way whenever it is either not 12 desired or simply not possible to transmit regional volatile information to an authorised recipient in real-time. In partic-13 ular, for wireless sensor network applications with an asynchronous character, the wireless sensor(More)
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party wireless sensor network implementations to become meaningful and profitable. For wireless sensor networks, we demonstrated in our previous work that privacy homomorphisms, when used for this purpose, offer two striking advantages apart(More)
Keywords: Identity management systems Trust and reputation management Dynamic federation Privacy homomorphisms Web services a b s t r a c t Electronic transactions are becoming more important everyday. Several tasks like buying goods, booking flights or hotel rooms, or paying for streaming a movie, for instance, can be carried out through the Internet.(More)
This paper formally defines recognition as a new security principle closely related to authentication. Low-power sensor networks with no pre-deployment information require the less authoritative security of recognition. We give general properties of recognition protocols based on the method of key disclosure. We examine previously proposed low-power(More)
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines like for example from the agriculture sector, geography, health care, or biology will only use wireless sensor networks to support their daily work if the overall benefit beats(More)