2012 Seventh International Conference on Availability, Reliability and Security 2012
DOI: 10.1109/ares.2012.36
|View full text |Cite
|
Sign up to set email alerts
|

Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach

Abstract: Secure initialization of sensor nodes with cryptographic keys is inherent to all security protocols and applicationsin the area of wireless sensor networks (WSN).We introduce a general framework, denoted TOPKEY, thatprovides tool assistance and performs secure initialization ofsensor nodes with cryptographic keys over the air by leveraging the transmission power to confine the area in which potential attackers can eavesdrop on communication. Our analysis shows that physical protection based on transmission pow… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…The adoption of a symmetric encryption scheme implies that each pair of nodes of the WSNs shares a secret key. The negotiation of these cryptographic keys (key management [6] [7]) is independent of the employed encryption method and heavily affects the security, the computational load and power consumption of the WSN.…”
Section: Introductionmentioning
confidence: 99%
“…The adoption of a symmetric encryption scheme implies that each pair of nodes of the WSNs shares a secret key. The negotiation of these cryptographic keys (key management [6] [7]) is independent of the employed encryption method and heavily affects the security, the computational load and power consumption of the WSN.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the dynamic characteristics of the network and memory restrictions in the devices, these approaches do not fit well for a WSN with millions of sensor nodes. As stated in reference [8] security goals for a particular WSN are depending on its network life time and application scenario. Generally, cryptographic keys play the most important role in initializing any kind of security in WSN.…”
Section: Related Workmentioning
confidence: 99%