{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T18:08:27Z","timestamp":1656526107839},"reference-count":22,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,5,1]]},"abstract":" Security in wireless sensor networks (WSNs) demands efficient key management schemes. In particular, one of the main research challenges is to ensure secure key storage by sensors due to their constrained resources and high exposure to tampering attempts. To address this issue, we have proposed SENSORLock, a secure key storage mechanism which can be applied to different key distribution architectures for WSNs. In this work, we evaluate SENSORLock through different study cases considering three key distribution architectures: TinySec, SPINS, and NCD. Our goal is to demonstrate its feasibility in large-scale sensor networks. Simulation results indicate that our mechanism introduces an average overhead of 1.9% in terms of end to end delay and provides a similar estimated power consumption compared to the aforementioned architectures. Hence, we argue that it is feasible to use SENSORLock (i) in large-scale sensor networks and (ii) under different key distribution schemes. <\/jats:p>","DOI":"10.1155\/2015\/392495","type":"journal-article","created":{"date-parts":[[2015,5,27]],"date-time":"2015-05-27T06:34:14Z","timestamp":1432708454000},"page":"392495","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["On the Performance of a Secure Storage Mechanism for Key Distribution Architectures in Wireless Sensor Networks"],"prefix":"10.1177","volume":"11","author":[{"given":"Juliano F.","family":"Kazienko","sequence":"first","affiliation":[{"name":"Computing Department, Federal University of Pampa, 97546-550 Alegrete, RS, Brazil"}]},{"given":"Paulo R. S.","family":"Silva Filho","sequence":"additional","affiliation":[{"name":"Computing Institute, Fluminense Federal University, 24210-240 Niter\u00f3i, RJ, Brazil"}]},{"given":"Igor M.","family":"Moraes","sequence":"additional","affiliation":[{"name":"Computing Institute, Fluminense Federal University, 24210-240 Niter\u00f3i, RJ, Brazil"}]},{"given":"C\u00e9lio V. N.","family":"Albuquerque","sequence":"additional","affiliation":[{"name":"Computing Institute, Fluminense Federal University, 24210-240 Niter\u00f3i, RJ, Brazil"}]}],"member":"179","published-online":{"date-parts":[[2015,5,26]]},"reference":[{"key":"B4-2015-392495","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"B1-2015-392495","doi-asserted-by":"publisher","DOI":"10.1016\/s1389-1286(01)00302-4"},{"key":"B24-2015-392495","doi-asserted-by":"publisher","DOI":"10.1109\/maes.2008.4558008"},{"key":"B6-2015-392495","first-page":"1","volume-title":"Proceedings of the 3rd International Conference on Security in Pervasive Computing (SPC '06)","author":"Becher A."},{"key":"B14-2015-392495","doi-asserted-by":"publisher","DOI":"10.1002\/sec.686"},{"key":"B11-2015-392495","first-page":"162","volume-title":"Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems","author":"Karlof C."},{"key":"B22-2015-392495","doi-asserted-by":"publisher","DOI":"10.1023\/a:1016598314198"},{"key":"B21-2015-392495","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2008.928538"},{"key":"B19-2015-392495","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916.ch13"},{"key":"B2-2015-392495","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.07.002"},{"key":"B9-2015-392495","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2003.09.009"},{"key":"B18-2015-392495","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73408-6_16"},{"key":"B12-2015-392495","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2008.923722"},{"key":"B23-2015-392495","first-page":"86","volume-title":"Proceedings of the Workshop on Fast Software Encryption","author":"Rivest R. L."},{"key":"B15-2015-392495","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.011"},{"key":"B8-2015-392495","doi-asserted-by":"publisher","DOI":"10.1109\/wiopt.2007.4480051"},{"key":"B13-2015-392495","first-page":"890","volume-title":"Proceedings of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications in Conjunction with 10th IEEE International Conference on Computer and Information Technology (TSP\/CIT '10)","author":"Kazienko J. F."},{"key":"B17-2015-392495","first-page":"115","volume-title":"Ambient Intelligence","author":"Levis P.","year":"2004"},{"key":"B16-2015-392495","first-page":"126","volume-title":"Proceedings of the 1st International Conference on Embedded Networked Sensor Systems","author":"Levis P."},{"key":"B10-2015-392495","volume-title":"Indian Institute of Science\u2014Cryptography Algorithms for TinyOS","author":"IIS","year":"2012"},{"key":"B25-2015-392495","volume-title":"Cryptography and Network Security: Principles and Practice","author":"Stallings W.","year":"2010","edition":"5"},{"key":"B7-2015-392495","volume-title":"Micaz Datasheet","author":"Crossbow","year":"2010"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/392495","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/392495","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/392495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T21:46:28Z","timestamp":1620251188000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/392495"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,1]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5,1]]}},"alternative-id":["10.1155\/2015\/392495"],"URL":"https:\/\/doi.org\/10.1155\/2015\/392495","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,1]]}}}