— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
d Abstract) Stefan Lucks1 , Erik Zenner2 , Andr´e Weimerskirch3 , Dirk Westhoff4 1 Theoretische Informatik, University of Mannheim, Germany 2 Erik Zenner, Cryptico A/S, Copenhagen...
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...