Page 1. Organisation General Chair M. Palaniswami (University of Melbourne, Australia) Symposium ... more Page 1. Organisation General Chair M. Palaniswami (University of Melbourne, Australia) Symposium and Workshop Chairs Symposium on Sensor Networks Paul JM Havinga (University of Twente, The Netherlands) Tim Wark (CSIRO, Australia) Symposium on Sensor Fusion, Intelligent Sensors and Applications Danil Prokhorov (Toyota, USA) Thomas Hanselmann (University of Melbourne, Australia) Symposium on Information Processing in Sensor Networks Salim Bouzerdoum (University of Wollongong, Australia) ...
The constrained resources of sensors restrict the design of a key management scheme for wireless ... more The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model considers the node capture, the gossip-based network and the revocation problems, which should be valuable for ALwEN-like applications. Based on Shamir’s secret sharing technique, we then propose two key management schemes for ALwEN, namely the KALwEN+ schemes, which are proven with the security properties defined in the security model. The KALwEN+ schemes not only fit ALwEN, but also can be tailored to other scalable wireless sensor networks based on gossiping.
The biggest advantage of building “intelligence” into a sensor is that the sensor can process dat... more The biggest advantage of building “intelligence” into a sensor is that the sensor can process data before sending them to a data consumer. The kind of processing that is often needed is to aggregate the data into a more compact representation called an aggregate, and send the aggregate to the data consumer instead. The main security challenges to such a process are (1) to prevent Byzantine-corrupted data from rendering the final aggregate totally meaningless and (2) to provide end-to-end confidentiality between the data providers and the data consumer. This chapter surveys the state of the art in techniques for addressing these challenges.
We present a decentralized key management architecture for wireless sensor networks, covering the... more We present a decentralized key management architecture for wireless sensor networks, covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines. Balance between security and energy consumption is achieved by partitioning a system into two interoperable security realms: the supervised realm trades off simplicity and resources for higher security whereas in the unsupervised realm the vice versa is true. Key deployment uses minimal key storage while key refreshment is based on the well-studied scheme of Abdalla et al. The keying protocols involved use only symmetric cryptography and have all been verified with our constraint solving-based protocol verification tool CoProVe.
Abstract A centralized self-localization algorithm is used to estimate sensor locations. From the... more Abstract A centralized self-localization algorithm is used to estimate sensor locations. From the known positions of at least 3 anchor nodes the remaining sensor positions are estimated using an efficient particle filter (PF) with progressive correction. The measurement model ...
1Faculty of EWI, University of Twente, The Netherlands {z.gong, s.nikova}@utwente.nl ... 2 Dept. ... more 1Faculty of EWI, University of Twente, The Netherlands {z.gong, s.nikova}@utwente.nl ... 2 Dept. ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Belgium 3 Department of EEE, The University of Melbourne, Australia yee.wei.law@gmail.com
Page 1. Organisation General Chair M. Palaniswami (University of Melbourne, Australia) Symposium ... more Page 1. Organisation General Chair M. Palaniswami (University of Melbourne, Australia) Symposium and Workshop Chairs Symposium on Sensor Networks Paul JM Havinga (University of Twente, The Netherlands) Tim Wark (CSIRO, Australia) Symposium on Sensor Fusion, Intelligent Sensors and Applications Danil Prokhorov (Toyota, USA) Thomas Hanselmann (University of Melbourne, Australia) Symposium on Information Processing in Sensor Networks Salim Bouzerdoum (University of Wollongong, Australia) ...
The constrained resources of sensors restrict the design of a key management scheme for wireless ... more The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model considers the node capture, the gossip-based network and the revocation problems, which should be valuable for ALwEN-like applications. Based on Shamir’s secret sharing technique, we then propose two key management schemes for ALwEN, namely the KALwEN+ schemes, which are proven with the security properties defined in the security model. The KALwEN+ schemes not only fit ALwEN, but also can be tailored to other scalable wireless sensor networks based on gossiping.
The biggest advantage of building “intelligence” into a sensor is that the sensor can process dat... more The biggest advantage of building “intelligence” into a sensor is that the sensor can process data before sending them to a data consumer. The kind of processing that is often needed is to aggregate the data into a more compact representation called an aggregate, and send the aggregate to the data consumer instead. The main security challenges to such a process are (1) to prevent Byzantine-corrupted data from rendering the final aggregate totally meaningless and (2) to provide end-to-end confidentiality between the data providers and the data consumer. This chapter surveys the state of the art in techniques for addressing these challenges.
We present a decentralized key management architecture for wireless sensor networks, covering the... more We present a decentralized key management architecture for wireless sensor networks, covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines. Balance between security and energy consumption is achieved by partitioning a system into two interoperable security realms: the supervised realm trades off simplicity and resources for higher security whereas in the unsupervised realm the vice versa is true. Key deployment uses minimal key storage while key refreshment is based on the well-studied scheme of Abdalla et al. The keying protocols involved use only symmetric cryptography and have all been verified with our constraint solving-based protocol verification tool CoProVe.
Abstract A centralized self-localization algorithm is used to estimate sensor locations. From the... more Abstract A centralized self-localization algorithm is used to estimate sensor locations. From the known positions of at least 3 anchor nodes the remaining sensor positions are estimated using an efficient particle filter (PF) with progressive correction. The measurement model ...
1Faculty of EWI, University of Twente, The Netherlands {z.gong, s.nikova}@utwente.nl ... 2 Dept. ... more 1Faculty of EWI, University of Twente, The Netherlands {z.gong, s.nikova}@utwente.nl ... 2 Dept. ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Belgium 3 Department of EEE, The University of Melbourne, Australia yee.wei.law@gmail.com
Uploads
Papers by Yee Wei Law