Access the full text.
Sign up today, get DeepDyve free for 14 days.
Mohamed Ahmed, G. Dini, R. Gold, S. Hailes, S. Porta, IM Savino (2008)
Secure reconfiguration in Networked Embedded Systems with the RUNES approach
Ross Anderson (2008)
Security engineering - a guide to building dependable distributed systems (2. ed.)
E. Cole, R. Krutz, James Conley (2005)
Network Security Bible
M. Younis, Kajaldeep Ghumman, M. Eltoweissy (2005)
Key management in wireless ad hoc networks: collusion analysis and preventionPCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005.
M. Demirbas (2005)
Wireless Sensor Networks for Monitoring of Large Public Buildings
R. Román, Jianying Zhou, J. Lopez (2006)
Applying intrusion detection systems to wireless sensor networksCCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006., 1
C. Intanagonwiwat, R. Govindan, D. Estrin (2000)
Directed diffusion: a scalable and robust communication paradigm for sensor networks
(2007)
Tinyecc: elliptic curve cryptography for sensor networks (version 0.3)
Paolo Costa, G. Coulson, C. Mascolo, G. Picco, S. Zachariadis (2005)
The RUNES middleware: a reconfigurable component-based approach to networked embedded systems2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications, 2
M. Waldvogel, G. Caronni, Dan Sun, Nathalie Weiler, B. Plattner (1999)
The VersaKey framework: versatile group key managementIEEE J. Sel. Areas Commun., 17
Yee Law, J. Doumen, P. Hartel (2006)
Survey and benchmark of block ciphers for wireless sensor networksACM Trans. Sens. Networks, 2
Yong Wang, B. Ramamurthy (2007)
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks2007 IEEE International Conference on Communications
Sencun Zhu, Sanjeev Setia, S. Jajodia (2006)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networksACM Trans. Sens. Networks, 2
Chris Karlof, N. Sastry, D. Wagner (2004)
TinySec: a link layer security architecture for wireless sensor networks
D. Wallner, E. Harder, Ryan Agee (1999)
Key Management for Multicast: Issues and ArchitecturesRFC, 2627
Sencun Zhu, Sanjeev Setia, S. Jajodia (2003)
LEAP: efficient security mechanisms for large-scale distributed sensor networks
M. Eltoweissy, Mohammed Moharrum, R. Mukkamala (2006)
Dynamic key management in sensor networksIEEE Communications Magazine, 44
(2001)
NIST FIPS PUB 197 Specification for the Advanced Encryption standard (AES)
Chung Wong, M. Gouda, S. Lam (2000)
Secure group communications using key graphsIEEE/ACM Trans. Netw., 8
A. Bicchi, A. Danesi, G. Dini, Isidoro Porta, L. Pallottino, I. Savino, R. Schiavi (2008)
Heterogeneous Wireless Multirobot SystemIEEE Robotics & Automation Magazine, 15
I. Akyildiz, I. Kasimoglu (2004)
Wireless sensor and actor networks: research challengesAd Hoc Networks, 2
P. Dutta, J. Hui, D. Chu, D. Culler (2006)
Securing the Deluge network programming system2006 5th International Conference on Information Processing in Sensor Networks
Chung Wong, M. Gouda, S. Lam (1998)
Secure group communications using key graphs
(2008)
A safe and secure component-based platform for heterogeneous multi-robot systems
Received XXX; YYY; accepted ZZZ ACM Transactions on Computational Logic
Laurent Eschenauer, V. Gligor (2002)
A key-management scheme for distributed sensor networks
J. Misic (2008)
Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchangeComput. Networks, 52
M. Eltoweissy, M. Heydari, Linda Morales, I. Sudborough (2003)
Combinatorial Optimization of Group Key ManagementJournal of Network and Systems Management, 12
L. Lamport (1981)
Password authentication with insecure communicationCommunications of The ACM, 24
Qing Zhang, Ting Yu, P. Ning (2008)
A Framework for Identifying Compromised Nodes in Wireless Sensor NetworksACM Trans. Inf. Syst. Secur., 11
M. Reiter (1996)
Distributing trust with the Rampart toolkitCommun. ACM, 39
G. Dini, I. Savino (2010)
A Security Architecture for Reconfigurable Networked Embedded SystemsInternational Journal of Wireless Information Networks, 17
S. Ravi, A. Raghunathan, P. Kocher, S. Hattangady (2004)
Security in embedded systems: Design challengesACM Trans. Embed. Comput. Syst., 3
Ju-Hyung Son, Jun-Sik Lee, S. Seo (2007)
Energy Efficient Group Key Management Scheme for Wireless Sensor Networks2007 2nd International Conference on Communication Systems Software and Middleware
M. Reiter (1994)
A secure group membership protocolProceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy
Ross Anderson (2001)
Security Engineering: A Guide to Building Dependable Distributed Systems
L. Mottola, G. Picco (2006)
Programming wireless sensor networks with logical neighborhoods
(2005)
New collisions search sha-1
(1998)
SKIPJACK and KEA Algorithm Specifications
R. Román, Cristina Alcaraz, Javier López (2007)
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network NodesMobile Networks and Applications, 12
尚弘 島影 (2001)
National Institute of Standards and Technologyにおける超伝導研究及び生活
A. Sherman, D. McGrew (2003)
Key Establishment in Large Dynamic Groups Using One-Way Function TreesIEEE Trans. Software Eng., 29
A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk, John Anderson (2002)
Wireless sensor networks for habitat monitoring
Jing Deng, Richard Han, Shivakant Mishra (2006)
Secure code distribution in dynamically programmable wireless sensor networks2006 5th International Conference on Information Processing in Sensor Networks
R. Rivest (1990)
The MD5 Message-Digest Algorithm
LARK: A Lightweight Authenticated Rekeying Scheme 41
R. Rivest, A. Shamir, L. Adleman (1978)
A method for obtaining digital signatures and public-key cryptosystemsCommun. ACM, 21
X. Zou, B. Ramamurthy, S. Magliveras (2004)
Secure Group Communications Over Data Networks
Haowen Chan, V. Gligor, A. Perrig, Gautam Muralidharan (2005)
On the distribution and revocation of cryptographic keys in sensor networksIEEE Transactions on Dependable and Secure Computing, 2
Karl-Erik Årzén, A. Bicchi, G. Dini, S. Hailes, K. Johansson, J. Lygeros, A. Tzes (2007)
A Component-Based Approach to the Design of Networked Control SystemsEur. J. Control, 13
(1995)
FIPS PUB 180-1: Secure Hash Standard
S. Rafaeli, D. Hutchison (2003)
A survey of key management for secure group communicationACM Comput. Surv., 35
(2005)
Plan for new cryptographic hash functions
Dungara Choudhary, Dev Anshul, Suman Roy, S. ChandrashekharThejaswiP. (2007)
Computationally and Resource Efficient Group Key Agreement for Ad Hoc Sensor Networks2007 2nd International Conference on Communication Systems Software and Middleware
R. Rivest (1994)
The RC5 Encryption Algorithm
Taejoon Park, K. Shin (2004)
LiSP: A lightweight security protocol for wireless sensor networksACM Trans. Embed. Comput. Syst., 3
Jason Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, K. Pister (2000)
System architecture directions for networked sensors
(2004)
CC2420 Datasheet
K. Piotrowski, P. Langendörfer, Steffen Peter (2006)
How public key cryptography influences wireless sensor node lifetime
E. Petriu, N. Georganas, D. Petriu, Dimitrios Makrakis, V. Groza (2000)
Sensor-based information appliancesIEEE Instrumentation & Measurement Magazine, 3
L. Mottola, G. Picco (2006)
Logical Neighborhoods: A Programming Abstraction for Wireless Sensor Networks
Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, D. Agrawal (2008)
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor NetworksIEEE Transactions on Mobile Computing, 7
A. Cárdenas, T. Roosta, S. Sastry (2009)
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systemsAd Hoc Networks, 7
(2011)
Tmote sky
Month 20YY. LARK: a Lightweight Authenticated ReKeying scheme for Clustered Wireless Sensor Networks · 139
J. Polastre, R. Szewczyk, D. Culler (2005)
Telos: enabling ultra-low power wireless researchIPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005.
M. Eltoweissy, A. Wadaa, S. Olariu, L. Wilson (2005)
Group key management scheme for large-scale sensor networksAd Hoc Networks, 3
H. Dobbertin, A. Bosselaers, B. Preneel (1996)
RIPEMD-160: A Strengthened Version of RIPEMD
M. Younis, Kajaldeep Ghumman, M. Eltoweissy (2006)
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor NetworksIEEE Transactions on Parallel and Distributed Systems, 17
A. Menezes, P. Oorschot, S. Vanstone (2018)
Handbook of Applied Cryptography
B. Sinopoli, Courtney Sharp, L. Schenato, S. Schaffert, S. Sastry (2003)
Distributed control applications within sensor networksProc. IEEE, 91
A. Perrig, R. Szewczyk, J. Tygar, Victor Wen, D. Culler (2001)
SPINS: Security Protocols for Sensor NetworksWireless Networks, 8
O. Younis, M. Krunz, S. Ramasubramanian (2006)
Node clustering in wireless sensor networks: recent developments and deployment challengesIEEE Network, 20
(2011)
Article 41, Publication date
G. Dini, I. Savino (2006)
S2RP: a Secure and Scalable Rekeying Protocol for Wireless Sensor Networks2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems
D. Coppersmith, M. Jakobsson (2002)
Almost Optimal Hash Sequence TraversalIACR Cryptol. ePrint Arch., 2002
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks GIANLUCA DINI and IDA M. SAVINO, University of Pisa Group communication has proven a powerful paradigm for designing applications and services in Wireless Sensor Networks (WSNs). Given the tight interaction between WSNs and the physical world, a security infringement may translate into a safety infringement. Therefore, in order to fully exploit the group communication paradigm we need to secure it. Traditionally, this requirement has been formalized in terms of backward and forward security and ful lled by means of rekeying. In WSNs, group rekeying becomes particularly a complex problem because communication takes place over an easily accessible wireless medium and because sensor nodes have severe limitations in terms of computing, storage, energy, and tamper-resistance capabilities for cost reasons. In this article we present a Lightweight Authenticated ReKeying (LARK) scheme for clustered WSNs. LARK guarantees backward and forward security, is scalable in terms of communication overhead, and ef cient in terms of computing overhead for key authentiticy veri cation. LARK achieves security, ef ciency, and scalability by exploiting two basic well-known mechanisms, namely key graph and key chain, and integrating them in an original way. LARK supports a
ACM Transactions on Embedded Computing Systems (TECS) – Association for Computing Machinery
Published: Nov 1, 2011
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.