B. Key Exchange in Sensor Networks

B.1Introduction
B.2Security Issues in a Sensor Network
B.3The Basic Bootstrapping Framework
B.4The Basic Random Key Predistribution Scheme
B.5Random Pairwise Scheme
B.6Polynomial-pool-based Key Predistribution
B.7Matrix-based Key Predistribution
B.8Location-aware Key Predistribution

One of the keys to happiness is a bad memory.

—Rita Mae Brown

That theory is worthless. It isn’t even wrong!

—Wolfgang Pauli

You’re only as sick as your secrets.

—Anonymous

Get Public-key Cryptography: Theory and Practice now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.