2013
DOI: 10.1002/sec.686
|View full text |Cite
|
Sign up to set email alerts
|

SENSORLock: a lightweight key management scheme for wireless sensor networks

Abstract: Security in wireless sensor networks demands an efficient key management scheme. As sensors typically operate unattended, it becomes quite important to ensure security to cryptographic keys stored in their memories. In this scenario, the development of lightweight encryption mechanisms is a challenge because of sensor‐constrained resources. In this work, we present a mechanism tailored to sensor networks called SENSORLock applying it to a specific case. Our main contribution is to propose, analyze, and demonst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…Firstly, we want to highlight that a security analysis was carried out in Kazienko and Albuquerque [21]. Additionally, real small-scale experiments were accomplished in Kazienko et al [6] where a small scenario was deployed with TelosB and MicaZ sensors. Experimental results revealed the low footprint of code and SENSORLock low processing overhead.…”
Section: 1mentioning
confidence: 99%
See 2 more Smart Citations
“…Firstly, we want to highlight that a security analysis was carried out in Kazienko and Albuquerque [21]. Additionally, real small-scale experiments were accomplished in Kazienko et al [6] where a small scenario was deployed with TelosB and MicaZ sensors. Experimental results revealed the low footprint of code and SENSORLock low processing overhead.…”
Section: 1mentioning
confidence: 99%
“…In our previous work, we focused on secure symmetric keys storage supported by a cryptographic module (CM) responsible for holding a secret Z used to encrypt all system keys and data stored within the sensor's flash memory. We argue that CMs are affordable and, therefore, can be incorporated to off-the-shelf sensors, as discussed in Kazienko et al [6].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In order for the attacker to succeed in this case, he has to compromise all n paths. In , they proposed a secure symmetric key distribution mechanism for WSNs that solved the stored key exposure problem. Optimal key management design for secure WSNs was investigated in .…”
Section: Energy and Security Aware Route Selectionmentioning
confidence: 99%
“…Public-key operations (both software and hardware implementations), albeit computationally feasible [5,6], consume energy approximately three orders of magnitude higher than symmetric key encryption [7]. Therefore, in the last few years, different key distribution schemes using symmetric key algorithms have been developed for SNs [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%