Subject: Formal security analysis | [ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI] | [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] | [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] | Resource constraints | AVISPA | Energy efficiency | M2M | [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR] | Key establishment
International audience; A key establishment solution for heterogeneous Machine to Machine (M2M) communications is proposed. Decentralization in M2M environment leads to situations where highly resource-constrained nodes have to establish end-to-end secured contexts with... View more
 Y. Ben saied, A. Olivereau and D. Zeghlache,” Energy Efficiency in M2M Networks: A Cooperative Key Establishment System”, 3rd Int. Congress on Ultra Modern Telecommunications and Control Systems (ICUMT), 2011.
 H. Chan, A. Perrig and D. Song,“Key Distribution Techniques for Sensor Networks,” Wireless Sensor Networks, T. Znati et al., eds., 2004.
 P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, “NanoECC: testing the limits of elliptic curve cryptography in sensor networks,” Proceedings of the 7th international Conference on Information Processing in Sensor Networks (IPSN '08), pp. 305-320, 2008.
 H. Wang and Q. Li, “Efficient implementation of public key cryptosystems on mote sensors,” in Proceedings of the International Conference on Information and Communication Security (ICICS '06), pp. 519-528, December 2006.
 R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruss, “TinyPK: Securing sensor networks with public key technology,” in Proceedings of the 2nd ACM workshop W. Hu, P. Corke , W. C. Shih, L. Overs, “secFleck: A Public Key Technology Platform for Wireless Sensor Networks,” in Proceedings of the 6th European Conference on Wireless Sensor Networks, February 11-13, 2009, Cork, Ireland.
P. Pecho, J. Nagy, and P. Hanáček, “Power consumption of hardware cryptography platform for wireless sensor,” in Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '09), pp. 318-323, December 2009.
 G. Murphy, A. Keeshan, R. Agarwal, and E. Popovici, “Hardwaresoftware implementation of public-key cryptography for wireless sensor networks,” in IET Irish Signals and Systems Conference, pp. 463-468, June 2006.
 R. Riaz, A. Naureen, A. Akram, A. Akbar, K. Kim, and H. Farooq Ahmed, “A unified security framework with three key management schemes for wireless sensor networks,” Computer Communications, vol. 31, no. 18, pp. 4269-4280, 2008.
 J. Mache, C.-Y. Wan, and M. Yarvis, “Exploiting heterogeneity for sensor network security,” in Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2008, pp. 591-593.
 M. Petrova et al, “ Overall secure PN architecture,” in My Personal Adaptive Global NET (MAGNET), D2.1.2/D4.1.3,Octobre 2005