Overview of security research in EYES

The security research for the EYES project is mainly carried out by the the Univ. of Rome La Sapienza and the Univ. of Twente. While Rome is primarily interested in key management, Twente has been involved with an assortment of topics such as key management, cryptographic primitives and link-layer security. This document gives an overview of the research output of these two groups for the past 3 years

[1]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[2]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[3]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[4]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[5]  Yee Wei Law,et al.  A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.

[6]  Roberto Di Pietro,et al.  A Time Driven Methodology for Key Dimensioning in Multicast Communications , 2003, SEC.

[7]  Jerry den Hartog,et al.  Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[8]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[9]  Sandro Etalle,et al.  An Improved Constraint-Based System for the Verification of Security Protocols , 2002, SAS.

[10]  Deborah Estrin,et al.  Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.

[11]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[12]  Sushil Jajodia,et al.  Efficient and secure keys management for wireless mobile communications , 2002, POMC '02.

[13]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[14]  Roberto Di Pietro,et al.  Connectivity properties of secure wireless sensor networks , 2004, SASN '04.

[15]  Sushil Jajodia,et al.  Secure Selective Exclusion in Ad Hoc Wireless Network , 2002, SEC.

[16]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[17]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[18]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[19]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[20]  Yee Wei Law,et al.  Assessing Security in Energy-Efficient Sensor Networks , 2003, SEC.

[21]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[22]  Mihir Bellare,et al.  Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques , 2000, ASIACRYPT.

[23]  Yee Wei Law,et al.  Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract) , 2004 .

[24]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .