Show simple item record

dc.contributor.convenorM Palaniswamien_AU
dc.contributor.authorSingh, Kalvinderen_US
dc.contributor.authorMuthukkumarasamy, Vallipuramen_US
dc.contributor.editorM Palaniswamien_US
dc.date.accessioned2017-05-03T13:58:36Z
dc.date.available2017-05-03T13:58:36Z
dc.date.issued2006en_US
dc.date.modified2007-08-02T21:46:49Z
dc.identifier.refurihttp://www.icisip.orgen_AU
dc.identifier.urihttp://hdl.handle.net/10072/11508
dc.description.abstractWireless sensor networks provide solutions to a range of monitoring problems. However, they introduce a new set of problems mainly due to small memories, weak processors, limited energy and small packet size. Thus only a very few conventional protocols can readily be used in sensor networks. This paper proposes efficient protocols to distribute keys in wireless sensor networks. This is achieved without the necessity of using traditional encryption. The proposed solution replicates the authentication server such that a group of malicious and colluding servers cannot compromise security or disrupt service. We show that the proposed multiple server authentication protocols will only have O(n) complexity, where n is the number of authentication servers. The protocols use information from the sensor nodes and the servers to generate a new key, and do not solely rely on the sensor nodes to generate good random numbers. The scheme works well even when the base stations are untrusted. The proposed protocols guarantee that the new key is fresh and that the communicating nodes use the same key.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.format.extent109108 bytes
dc.format.extent33983 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypetext/plain
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherIEEEen_US
dc.publisher.placePiscattaway, NJ, USAen_US
dc.publisher.urihttp://www.icisip.org/2006/en_AU
dc.relation.ispartofstudentpublicationNen_AU
dc.relation.ispartofconferencenameFourth International Conference on Intelligent Sensing and Information Processingen_US
dc.relation.ispartofconferencetitleProceedings of the Fourth International Conference on Intelligent Sensing and Information Processingen_US
dc.relation.ispartofdatefrom2006-12-15en_US
dc.relation.ispartofdateto2006-12-18en_US
dc.relation.ispartoflocationBangaloreen_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchHISTORY AND ARCHAEOLOGYen_US
dc.subject.fieldofresearchcode291799en_US
dc.subject.fieldofresearchcode210000en_US
dc.subject.fieldofresearchcode289999en_US
dc.titleA Minimal Protocol for Authenticated Key Distribution in Wireless Sensor Networksen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.facultyGriffith Sciences, School of Information and Communication Technologyen_US
gro.rights.copyrightCopyright 2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en_AU
gro.date.issued2006
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record