ABSTRACT

Wireless sensor networks (WSNs) are a distributed collection of small sensor nodes that gather security-sensitive data and control security-critical operations in a wide range of industrial, home, and business applications [1]. Many applications require deploying sensor nodes in hostile environments where an adversary can eavesdrop sensor communications and can even capture a number of sensors and surreptitiously use them to compromise the network. Therefore, cryptographic protection is required to secure the sensor communication as well as to detect sensor capture and revoke the compromised keys. Given the limited communication and computational resources available at each sensor, security is expected to be a key challenge in WSNs [14, 23, 67].