• Corpus ID: 58437761


  author={David Carman and Peter Kruus and Brian J. Matt},
Executive Summary Confidentiality, integrity, and authentication services are critical to preventing an adversary from compromising the security of a distributed sensor network. Key management is likewise critical to establishing the keys necessary to provide this protection. However, providing key management is difficult due to the ad hoc nature, intermittent connectivity, and resource limitations of the sensor network environment. As part of the SensIT program, NAI Labs is addressing this… 
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
The security of LEAP+ under various attack models is analyzed and it is shown that it is very effective in defending against many sophisticated attacks, such as HELLO flood attacks, node cloning attacks, and wormhole attacks.
A Security Protocol for Wireless Sensor Networks
A set of security building blocks optimized for resource constrained environments and wireless communication, including SNEP and TESLA, which provides authenticated broadcast for severely resource-constrained surroundings is presented.
Key Management Schemes in Sensor Networks
This work aimed to generate a brief knowledge about different key management schemes and their effectiveness in sensor networks, noticing that no key distribution technique is ideal to all the scenarios where sensor networks are used; therefore the techniques employed must depend upon the requirements and resources of each individual sensor network.
An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks
The proposed authenticated key management (AKM) scheme is more resilient to node capture as compared to other random key pre-distribution schemes and can be applied for different routing and energy efficient data dissemination techniques for sensor networks.
Security and Collaboration Protocols for Mobile and Sensor Networks
This dissertation aims to design security and collaboration protocols to create a comprehensive trust framework to protect mobile and sensor networks by applying cryptographic algorithms and proposes and implements a distributed authentication protocol called DAPP in wireless sensor networks to allow sensors to authenticate servers without requiring a commonly-used trusted authentication server.
Secure Routing in Wireless Sensor Networks
Simulation results have shown that HIKES provides an energy-efficient and scalable solution to the key management problem and cost analysis shows that HikES is computationally efficient and has low storage requirement.
A Less Energy Efficient Key Management Protocol for WSNs
This paper presents an energy-aware approach for managing the cryptographic keys in a clustered sensor network and shows that the energy consumption overhead for the key management is remarkably low and reports an order-of-magnitude energy saving.
Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network
SSEKMS is a dynamic key management system that also supports the inclusion of the new node and refreshes the keys as per requirements, and compared it with other existing schemes.
Key Management for Wireless Sensor Networks in Hostile Environments
This work proposes a novel, self-organizing key management scheme for large-scale and long-lived WSNs, called Survivable and Efficient Clustered Keying (SECK), and shows that it is highly robust against node capture and key compromise while incurring low communication and storage overhead.
Sensor Networks-Security: SPINS
A suite of security building blocks optimized for resource constrained environments and wireless communication, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.


Computer communication security - principles, standard protocols and techniques
This chapter discusses the standardization process, which led to the establishment of ASN.I.
New multiparty authentication services and key agreement protocols
This paper studies the problem of authenticated key agreement in dynamic peer groups with the emphasis on efficient and provably secure key authentication, key confirmation, and integrity.
Network security via private-key certificates
This system combines a new notion of private-key certificates, a simple key-translation protocol, and key-distribution so that users can communicate securely while sharing neither an encryption key nor a network connection.
A Secure and Efficient Conference Key Distribution System (Extended Abstract)
The technique for authentication can be extended and used as the basis for an authentication scheme which is ‘proven’ secure against any type of attack, provided the Discrete Logarithm problem is intractable.
Cryptography and Network Security: Principles and Practice
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In
Distributed authentication in Kerberos using public key cryptography
  • M. Sirbu, J. Chuang
  • Computer Science
    Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security
  • 1997
By distributing most of the authentication workload away from the trusted intermediary and to the communicating parties, significant enhancements to security and scalability can be achieved as compared to Kerberos V5.
Perfectly-Secure Key Distribution for Dynamic Conferences
This paper considers the model where interaction is allowed in the common key computation phase, and shows a gap between the models by exhibiting an interactive scheme in which the user's information is only k + t - 1 times the size of the commonKey.
On Key Distribution and Authentication in Mobile Radio Networks
This paper presents a new secure and efficient key distribution protocol for mobile communication networks based on low exponent RSA and shows that the protocol shown is not secure.
Kerberos: an authentication service for computer networks
The authors concentrate on authentication for real-time, interactive services that are offered on computer networks, which includes remote login, file system reads and writes, and information retrieval for applications like Mosaic.
Timestamps in key distribution protocols
It is shown that key distribution protocols with timestamps prevent replays of compromised keys and have the additional benefit of replacing a two-step handshake.