18th International Parallel and Distributed Processing Symposium, 2004. Proceedings.
DOI: 10.1109/ipdps.2004.1303251
|View full text |Cite
|
Sign up to set email alerts
|

Ef .cient and resilient key discovery based on pseudo-random key pre-deployment

Abstract: A distributed Wireless Sensor Network (WSN) is a collection of n sensors with limited hardware resources and multihop message exchange capabilities. Due to the scarceness of resources, the distributed paradigm required, and the threats to the security, a challenging problem is how to implement secure pairwise communications among any pair of sensors in a WSN. In particular, storage memory and energy saving as well as resilience to physical compromising of a sensor are the more stringent requirements. The contr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
28
0

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(31 citation statements)
references
References 23 publications
0
28
0
Order By: Relevance
“…The selective node capture attacks or smart attacks were proposed for the first time by Pietro et al in [27]. Authors proposed in this paper a new attack where the adversary greedily uses the information disclosed by compromised nodes in order to choose the next node to capture.…”
Section: Smart Node Capture Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The selective node capture attacks or smart attacks were proposed for the first time by Pietro et al in [27]. Authors proposed in this paper a new attack where the adversary greedily uses the information disclosed by compromised nodes in order to choose the next node to capture.…”
Section: Smart Node Capture Attacksmentioning
confidence: 99%
“…Pietro et al proposed in [27][29] an efficient and secure shared key discovery way trading off communications for local computations. In the proposed solution, each node i is pre-loaded with keys from the global pool such as :…”
Section: Smart Node Capture Attacksmentioning
confidence: 99%
“…While these symmetric-key-based schemes are computationally efficient, the trade-off has to be paid for complicated key pre-distribution and key management, which incur large communication overhead during the key discovery. In their recent work [19], Di Pietro et al proposed an interesting key discovery scheme based on pseudorandom key pre-deployment. The scheme leverages the hash computation to find the matching keys so that the communications for key index exchanges in [7] can be avoided.…”
Section: Related Workmentioning
confidence: 99%
“…If two nodes are in each other's communication range and they share a common key, then they can encrypt the messages between them using the shared key and hence establish a secure link. A large number of key predistribution schemes have been proposed in the literature, e.g., [8,3,14,2,15,7,18].…”
Section: Introductionmentioning
confidence: 99%