Learn More
— End-to-end encryption for wireless sensor networks is a challenging problem. To save the overall energy resources of the network it is agreed that sensed data need to be consolidated and aggregated on their way to the final destination. We present an approach that (1) conceals sensed data end-to-end, by (2) still providing efficient in-network data(More)
—Routing in wireless sensor networks is different from that in commonsense mobile ad-hoc networks. It mainly needs to support reverse multicast traffic to one particular destination in a multihop manner. For such a communication pattern, end-to-end encryption is a challenging problem. To save the overall energy resources of the network, sensed data needs to(More)
— In-network data aggregation is a popular technique for reducing the energy consumption tied to data transmission in a multi-hop wireless sensor network. However, data aggregation in untrusted or even hostile environments becomes problematic when end-to-end privacy between sensors and the sink is desired. In this paper we revisit and investigate the(More)
— This paper formally defines recognition as a new security principle closely related to authentication. Low-power environments with no pre-deployment information require the less authoritative security of recognition. We give general properties of recognition protocols based on the method of key disclosure. We examine previously proposed low-power(More)
11 In wireless sensor networks there is a need to securely store monitored data in a distributed way whenever it is either not 12 desired or simply not possible to transmit regional volatile information to an authorised recipient in real-time. In partic-13 ular, for wireless sensor network applications with an asynchronous character, the wireless sensor(More)
There are two problem areas of the current Internet to be solved in Future Internet scenarios – security and putting the user back in control despite the move to the Internet of things. With this in mind, we address problems associated with the diversifying of the Internet towards an Internet of Things, and with increased ways to be reachable, whether the(More)
—User privacy is a growing requirement in the evolution of communication networks. In this sense, the concept of virtual personae, which corresponds to different identities of the same user, starts getting much attention. However, to provide privacy and non-linkage between these virtual users, a cross-layer approach to identity needs to be supported. This(More)
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines like for example from the agriculture sector, geography, health care, or biology will only use wireless sensor networks to support their daily work if the overall benefit beats(More)
Aggregator nodes commonly have the ability to read, corrupt or disrupt the flow of the information produced by a Wireless Sensor Network. Despite this fact, existing aggregator node election schemes do not address an adversary that strives to influence the election process towards candidates that it controls. We discuss the requirements that need to be(More)