Abstract
In this chapter, we investigate the security and privacy issues in mobile Wireless Sensor Networks (WSNs). Specifically, in Sects. 6.1 and 6.2, we briefly introduce the characteristics and the challenges of mobile WSNs. Section 6.3 outlines the security issues in WSNs, and reviews the conventional key establishment protocols (including symmetric key establishment protocols and asymmetric key establishment protocols) and physical layer key establishment protocols (including the key extraction protocols using the characteristics of wireless fading channels and the key distribution protocols using keyless cryptography technology). In Sect. 6.4, the privacy issues are outlined. Specifically, in this section, we review the localization protocols designed at higher layers and at the physical layer. Section 6.5 provides the future research trends and concludes this chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In practice, the internal attacks can be resisted by implementing certain techniques, such as the trust management protocols. This section only reviews the external attacks due to the length limitations.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)
Alpern, B., Schneider, F.B.: Key exchange using ‘keyless cryptography’. Information Processing Letters 16(2), 79–81 (1983)
Amundson, I., Koutsoukos, X.D.: A survey on localization for mobile wireless sensor networks. In: Mobile Entity Localization and Tracking in GPS-less Environments, Second International Workshop, MELT 2009, Orlando, FL, USA, September 30, 2009. Proceedings, pp. 235–254 (2009)
Amundson, I., Koutsoukos, X.D., Sallai, J.: Mobile sensor localization and navigation using RF doppler shifts. In: Proceedings of the ACM International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments, MELT 2008, San Francisco, California, USA, September 19, 2008, pp. 97–102 (2008)
Baggio, A., Langendoen, K.: Monte carlo localization for mobile wireless sensor networks. Ad Hoc Networks 6(5), 718–733 (2008)
Blom, R.: An optimal class of symmetric key generation systems. In: Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9–11, 1984, Proceedings, pp. 335–338 (1984)
Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16–20, 1992, Proceedings, pp. 471–486 (1992)
Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking 15(2), 346–358 (2007)
Cao, X., Xu, L., Zhang, Y., Wu, W.: Identity-based proxy signature for cloud service in saas. In: 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19–21, 2012, pp. 594–599 (2012)
Castelluccia, C., Mutaf, P.: Shake them up!: A movement-based pairing protocol for CPU-constrained devices. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005, Seattle, Washington, USA, June 6–8, 2005, pp. 51–64 (2005)
Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13–17 March 2005, Miami, FL, USA, pp. 524–535 (2005)
Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11–14 May 2003, Berkeley, CA, USA, p. 197 (2003)
Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Communications Surveys and Tutorials 11(2), 52–73 (2009)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Du, H., Li, J., Zhang, Y., Li, T., Zhang, Y.: Certificate-based key-insulated signature. In: Data and Knowledge Engineering - Third International Conference, ICDKE 2012, Wuyishan, Fujian, China, November 21–23, 2012. Proceedings, pp. 206–220 (2012)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings IEEE INFOCOM 2004, The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, March 7–11, 2004 (2004)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27–30, 2003, pp. 42–51 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Transactions on Dependable and Secure Computing 3(1), 62–77 (2006)
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18–22, 2002, pp. 41–47 (2002)
Estrin, D., Govindan, R., Heidemann, J.S., Kumar, S.: Next century challenges: Scalable coordination in sensor networks. In: MOBICOM ’99, The Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, Washington, USA, August 15–19, 1999., pp. 263–270 (1999)
Ge, M., Choo, K.R.: A novel hybrid key revocation scheme for wireless sensor networks. In: Network and System Security - 8th International Conference, NSS 2014, Xi’an, China, October 15–17, 2014, Proceedings, pp. 462–475 (2014)
Geng, Y., ming Rong, C., Veigner, C., Wang, J.T., Cheng, H.B.: Identity-based key agreement and encryption for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications 13(4), 54–60 (2006)
Gholami, M.R., Gezici, S., Ström, E.G.: TW-TOA based positioning in the presence of clock imperfections. Digital Signal Processing 59, 19–30 (2016)
Gopal, S.J., Anita, J.P., Sudheesh, P.: Particle filtering technique for fast fading shadow power estimation in wireless communication. In: Advances in Signal Processing and Intelligent Recognition Systems, pp. 105–115. Springer International Publishing, Cham (2018)
Guan, R.P., Ristic, B., Wang, L., Moran, B., Evans, R.: Feature based moving robot localization using doppler radar: Achievable accuracy. In: 20th International Conference on Information Fusion, FUSION 2017, Xi’an, China, July 10–13, 2017, pp. 1–6 (2017)
Hao, Y.: Target localization and track based on the energy source. Master’s thesis, Fudan University (2006)
He, D., Kumar, N., Choo, K.R., Wu, W.: Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Transactions on Information Forensics and Security 12(2), 454–464 (2017)
Hou, S., Huang, X., Xu, L.: Identity-based transitive signcryption. In: Network and System Security - 8th International Conference, NSS 2014, Xi’an, China, October 15–17, 2014, Proceedings, pp. 246–259 (2014)
Hu, Z., Gu, D., Song, Z., Li, H.: Localization in wireless sensor networks using a mobile anchor node. In: Advanced Intelligent Mechatronics, 2008. AIM 2008. IEEE/ASME International Conference on, pp. 602–607 (2008)
Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast authenticated key establishment protocols for self-organizing sensor networks. In: Proceedings of the Second ACM International Conference on Wireless Sensor Networks and Applications, WSNA 2003, San Diego, CA, USA, September 19, 2003, pp. 141–150 (2003)
Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signature revisited. In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2–4, 2007, Proceedings, pp. 308–322 (2007)
Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MOBICOM 2009, Beijing, China, September 20–25, 2009, pp. 321–332 (2009)
Kumar, V., Bergmann, N.W., Ahmad, I., Jurdak, R., Kusy, B.: Cluster-based position tracking of mobile sensors. CoRR abs/1710.04589 (2017)
Kuriakose, J., Joshi, S., Raju, R.V., Kilaru, A.: A review on localization in wireless sensor networks. In: Advances in Signal Processing and Intelligent Recognition Systems - selected and revised papers from the International Symposium on Signal Processing and Intelligent Recognition Systems, SIRS 2014, March 13–15, 2014, Trivandrum, India, pp. 599–610 (2014)
Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks. In: IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), p. 7. Citeseer (2002)
Lédeczi, Á., Nádas, A., Völgyesi, P., Balogh, G., Kusy, B., Sallai, J., Pap, G., Dóra, S., Molnár, K., Maróti, M., Simon, G.: Countersniper system for urban warfare. ACM Transactions on Sensor Networks 1(2), 153–177 (2005)
Lee, J., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor networks. In: Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004, Revised Selected Papers, pp. 294–307 (2004)
Li, H., Bu, Y., Xue, H., Li, X., Ma, H.: Path planning for mobile anchor node in localization for wireless sensor networks. Journal of Computer Research and Development 46(1), 129–136 (2009)
Li, J., Du, H., Zhang, Y., Li, T., Zhang, Y.: Provably secure certificate-based key-insulated signature scheme. Concurrency and Computation: Practice and Experience 26(8), 1546–1560 (2014)
Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems 25(8), 2201–2210 (2014)
Li, J., Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Transactions on Computers 64(2), 425–437 (2015)
Lin, C., Huang, X., Li, S., Wu, W., Yang, S.: Linearly homomorphic signatures with designated entities. In: Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings, pp. 375–390 (2017)
Lin, H., Xu, L., Huang, X., Wu, W., Huang, Y.: A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Networks 35, 51–64 (2015)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27–30, 2003, pp. 52–61 (2003)
Liu, D., Ning, P.: Improving key predistribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 1(2), 204–239 (2005)
Liu, J.K., Au, M.H., Huang, X., Lu, R., Li, J.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security 11(3), 484–497 (2016)
Luo, R.C., Chen, O., Pan, S.H.: Mobile user localization in wireless sensor network using grey prediction method. In: 31st Annual Conference of IEEE Industrial Electronics Society, 2005. IECON 2005., pp. 2680–2685 (2005)
Ma, M., He, D., Kumar, N., Choo, K.R., Chen, J.: Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Transactions on Industrial Informatics 14(2), 759–767 (2018)
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, SECON 2004, October 4–7, 2004, Santa Clara, CA, USA, pp. 71–80 (2004)
Mathur, S., Trappe, W., Mandayam, N.B., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, San Francisco, California, USA, September 14–19, 2008, pp. 128–139 (2008)
McCarthy, M., Duff, P., Muller, H.L., Randell, C.: Accessible ultrasonic positioning. IEEE Pervasive Computing 5(4), 86–93 (2006)
Neuwinger, B., Witkowski, U., Rückert, U.: Ad-hoc communication and localization system for mobile robots. In: Advances in Robotics, FIRA RoboWorld Congress 2009, Incheon, Korea, August 16–20, 2009. Proceedings, pp. 220–229 (2009)
Niculescu, D., Badrinath, B.R.: Ad hoc positioning system (APS) using AOA. In: Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, USA, March 30 - April 3, 2003, pp. 1734–1743 (2003)
Oliferuk, W., Maj, M., Zembrzycki, K.: Determination of the energy storage rate distribution in the area of strain localization using infrared and visible imaging. Experimental Mechanics 55(4), 753–760 (2015)
Ou, C., Ssu, K.: Sensor position determination with flying anchors in three-dimensional wireless sensor networks. IEEE Transactions on Mobile Computing 7(9), 1084–1097 (2008)
Peng, J., Choo, K.R., Ashman, H.: User profiling in intrusion detection: A review. Journal of Network and Computer Applications 72, 14–27 (2016)
Peng, K., Zhang, Y.: A secure mix network with an efficient validity verification mechanism. In: Internet and Distributed Computing Systems - 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21–23, 2012. Proceedings, pp. 85–96 (2012)
Peng, Y., Wang, P., Xiang, W., Li, Y.: Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels. IEEE Transactions on Wireless Communications 16(8), 5176–5186 (2017)
Perrig, A., Stankovic, J.A., Wagner, D.A.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004)
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor networks. In: MOBICOM 2001, Proceedings of the seventh annual international conference on Mobile computing and networking, Rome, Italy, July 16–21, 2001., pp. 189–199 (2001)
Pietro, R.D., Mancini, L.V., Law, Y.W., Etalle, S., Havinga, P.J.M.: LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In: 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 6–9 October 2003, Kaohsiung, Taiwan, p. 397 (2003)
Pietro, R.D., Oligeri, G.: COKE crypto-less over-the-air key establishment. IEEE Transactions on Information Forensics and Security 8(1), 163–173 (2013)
Pietro, R.D., Oligeri, G.: ESC: An efficient, scalable, and crypto-less solution to secure wireless networks. Computer Networks 84, 46–63 (2015)
Premnath, S.N., Jana, S., Croft, J., Gowda, P.L., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: Secret key extraction from wireless signal strength in real environments. IEEE Transaction on Mobile Computing 12(5), 917–930 (2013)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Ruj, S., Nayak, A., Stojmenovic, I.: Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers 62(11), 2224–2237 (2013)
Shen, J., Moh, S., Chung, I.: Identity-based key agreement protocol employing a symmetric balanced incomplete block design. Journal of Communications and Networks 14(6), 682–691 (2012)
Shen, J., Wang, A., Wang, C., Hung, P.C.K., Lai, C.: An efficient centroid-based routing protocol for energy management in wsn-assisted iot. IEEE Access 5, 18,469–18,479 (2017)
Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, to be appear (2017)
Shimizu, T., Iwai, H., Sasaoka, H.: Physical-layer secret key agreement in two-way wireless relaying systems. IEEE Transactions on Information Forensics and Security 6(3–1), 650–660 (2011)
Shu, L., Hara, T., Nishio, S., Chen, Y., Hauswirth, M.: The new challenge: mobile multimedia sensor networks. International Journal of Multimedia Intelligence and Security 2(2), 107–119 (2011)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. No. RFC 2627 (1999)
Wang, D., Gu, Q., Cheng, H., Wang, P.: The request for better measurement: A comparative evaluation of two-factor authentication schemes. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, China, May 30 - June 3, 2016, pp. 475–486 (2016)
Wang, D., Wang, P.: Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Transactions on Dependable and Secure Computing pp. 1–1 (2017)
Wang, M., Zhang, Y., Ma, J., Wu, W.: A universal designated multi verifiers content extraction signature scheme. International Journal of Computational Science and Engineering, to appear (2018)
Wang, Q., Su, H., Ren, K., Kim, K.: Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10–15 April 2011, Shanghai, China, pp. 1422–1430 (2011)
Wang, Q., Xu, K., Ren, K.: Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE Journal on Selected Areas in Communications 30(9), 1666–1674 (2012)
Watro, R.J., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 59–64 (2004)
Wei, L., Zhang, H., Yu, B., Song, J., Guan, Y.: Cubic-receiver-based indoor optical wireless location system. IEEE Photonics Journal 8(1), 1–7 (2016)
Xi, W., Qian, C., Han, J., Zhao, K., Zhong, S., Li, X., Zhao, J.: Instant and robust authentication and key agreement among mobile devices. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24–28, 2016, pp. 616–627 (2016)
Xie, B., Chen, K., Tan, G., Lu, M., Liu, Y., Wu, J., He, T.: LIPS: A light intensity-based positioning system for indoor environments. ACM Transactions on Sensor Networks 12(4), 28:1–28:27 (2016)
Xie, B., Tan, G., He, T.: Spinlight: A high accuracy and robust light positioning system for indoor applications. In: Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, SenSys 2015, Seoul, South Korea, November 1–4, 2015, pp. 211–223 (2015)
Xu, B., Qi, W., Zhao, Y., Wei, L., Zhang, C.: Holographic radio interferometry for target tracking in dense multipath indoor environments. In: 9th International Conference on Wireless Communications and Signal Processing, WCSP 2017, Nanjing, China, October 11–13, 2017, pp. 1–6 (2017)
Xu, C., Firner, B., Zhang, Y., Howard, R.E.: The case for efficient and robust rf-based device-free localization. IEEE Transactions on Mobile Computing 15(9), 2362–2375 (2016)
Xu, L., Cao, X., Zhang, Y., Wu, W.: Software service signature (S3) for authentication in cloud computing. Cluster Computing 16(4), 905–914 (2013)
Xu, L., Zhang, Y.: Matrix-based pairwise key establishment for wireless mesh networks. Future Generation Computer Systems 30, 140–145 (2014)
Yang, X., Zhang, Y., Liu, J.K., Zeng, Y.: A trust and privacy preserving handover authentication protocol for wireless networks. In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23–26, 2016, pp. 138–143 (2016)
Ye, A., Zheng, Y., Xu, L., Zhang, Y.: A road-network based privacy-preserving approach in trajectory publishing. Journal of Internet Technology 18(4), 867–876 (2017)
Zan, B., Gruteser, M., Hu, F.: Key agreement algorithms for vehicular communication networks based on reciprocity and diversity theorems. IEEE Transactions on Vehicular Technology 62(8), 4020–4027 (2013)
Zeng, K., Wu, D., Chan, A.J., Mohapatra, P.: Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In: INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15–19 March 2010, San Diego, CA, USA, pp. 1837–1845 (2010)
Zhang, L., Zhou, X., Cheng, Q.: Landscape-3d; A robust localization scheme for sensor networks over complex 3d terrains. In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14–16 November 2006, pp. 239–246 (2006)
Zhang, Y., Xiang, Y., Huang, X.: Password-authenticated group key exchange: A cross-layer design. ACM Transactions on Internet Technology 16(4), 24:1–24:20 (2016)
Zhang, Y., Xiang, Y., Huang, X.: A cross-layer key establishment model for wireless devices in cyber-physical systems. In: Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017, pp. 43–53 (2017)
Zhang, Y., Xiang, Y., Huang, X., Chen, X., Alelaiwi, A.: A matrix-based cross-layer key establishment protocol for smart homes. Information Sciences 429, 390–405 (2018)
Zhang, Y., Xiang, Y., Huang, X., Xu, L.: A cross-layer key establishment scheme in wireless mesh networks. In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7–11, 2014. Proceedings, Part I, pp. 526–541 (2014)
Zhang, Y., Xiang, Y., Wang, T., Wu, W., Shen, J.: An over-the-air key establishment protocol using keyless cryptography. Future Generation Computer Systems 79, 284–294 (2018)
Zhang, Y., Xiang, Y., Wu, W., Alelaiwi, A.: A variant of password authenticated key exchange protocol. Future Generation Computer Systems 78, 699–711 (2018)
Zhang, Y., Xu, L., Huang, X.: Polynomial based key predistribution scheme in wireless mesh networks. Journal of Computational Information System 8(6), 2539–2549 (2012)
Zhang, Y., Xu, L., Huang, X., Li, J.: Matrix-based pairwise key establishment with pre and post deployment knowledge for wireless mesh networks. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013, Taichung, Taiwan, July 3–5, 2013, pp. 153–158 (2013)
Zhang, Y., Xu, L., Huang, X., Li, J.: Matrix-based key pre-distribution schemes in wmns using pre and post deployment knowledge. International Journal of Ad Hoc and Ubiquitous Computing 20(4), 262–273 (2015)
Zhang, Y., Xu, L., Xiang, Y., Huang, X.: Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge. In: Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, June 9–13, 2013, pp. 1604–1608 (2013)
Zhang, Y., Xu, L., Xiang, Y., Huang, X.: A matrix-based pairwise key establishment scheme for wireless mesh networks using pre deployment knowledge. IEEE Transactions on Emerging Topics in Computing 1(2), 331–340 (2013)
Zhu, C., Shu, L., Hara, T., Wang, L., Nishio, S., Yang, L.T.: A survey on communication and data management issues in mobile sensor networks. Wireless Communications and Mobile Computing 14(1), 19–36 (2014)
Zhu, F., Zhang, Y., Lin, C., Wu, W., Meng, R.: A universal designated multi-verifier transitive signature scheme. In: Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017, Revised Selected Papers, pp. 180–195 (2017)
Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27–30, 2003, pp. 62–72 (2003)
Zhu, X., Xu, F., Novak, E., Tan, C.C., Li, Q., Chen, G.: Using wireless link dynamics to extract a secret key in vehicular scenarios. IEEE Transactions on Mobile Computing 16(7), 2065–2078 (2017)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Zhong, S. et al. (2019). Connecting Things to Things in Physical-World: Security and Privacy Issues in Mobile Sensor Networks. In: Security and Privacy for Next-Generation Wireless Networks. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-01150-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-01150-5_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01149-9
Online ISBN: 978-3-030-01150-5
eBook Packages: Computer ScienceComputer Science (R0)