LEDS: Providing location-aware end-to-end data security in wireless sensor networks

K Ren, W Lou, Y Zhang - IEEE Transactions on Mobile …, 2008 - ieeexplore.ieee.org
Providing desirable data security, that is, confidentiality, authenticity, and availability, in
wireless sensor networks (WSNs) is challenging, as a WSN usually consists of a large …

Dependable and secure sensor data storage with dynamic integrity assurance

Q Wang, K Ren, S Yu, W Lou - ACM Transactions on Sensor Networks …, 2011 - dl.acm.org
Recently, distributed data storage has gained increasing popularity for efficient and robust
data management in wireless sensor networks (WSNs). The distributed architecture makes it …

On broadcast authentication in wireless sensor networks

K Ren, W Lou, K Zeng, PJ Moran - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Broadcast authentication is a critical security service in wireless sensor networks (WSNs),
since it enables users to broadcast the WSN in an authenticated way. Symmetric key based …

Two‐factor mutual authentication with key agreement in wireless sensor networks

B Vaidya, D Makrakis, H Mouftah - Security and …, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) are getting popular for their deployment in unattended
environments, where a registered user can log in to the network and access data collected …

Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks

A Rasheed, R Mahapatra - IEEE Transactions on Parallel and …, 2010 - ieeexplore.ieee.org
Security services such as authentication and pairwise key establishment are critical to
sensor networks. They enable sensor nodes to communicate securely with each other using …

Introducing secure provenance in IoT: Requirements and challenges

S Suhail, CS Hong, ZU Ahmad… - … Workshop on Secure …, 2016 - ieeexplore.ieee.org
In current cyber-physical systems, IoT represents interconnection of highly heterogeneous
networked entities, providing goods and services to a variety of domains including …

Scalable and efficient key management for heterogeneous sensor networks

F Kausar, S Hussain, LT Yang, A Masood - The Journal of …, 2008 - Springer
As typical wireless sensor networks (WSNs) have resource limitations, predistribution of
secret keys is possibly the most practical approach for secure network communications. In …

An efficient key distribution scheme for heterogeneous sensor networks

S Hussain, F Kausar, A Masood - Proceedings of the 2007 international …, 2007 - dl.acm.org
Key distribution refers to the problem of establishing shared secrets on sensor nodes such
that secret symmetric keys for communication privacy, integrity and authenticity can be …

Energy-efficient privacy protection for smart home environments using behavioral semantics

H Park, C Basaran, T Park, SH Son - Sensors, 2014 - mdpi.com
Research on smart environments saturated with ubiquitous computing devices is rapidly
advancing while raising serious privacy issues. According to recent studies, privacy …

Secure and fault-tolerant event boundary detection in wireless sensor networks

K Ren, K Zeng, W Lou - IEEE transactions on wireless …, 2008 - ieeexplore.ieee.org
Event boundary detection is in and of itself a useful application in wireless sensor networks
(WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such as the …