@inproceedings {Alcaraz2006, title = {Applying Key Infrastructures for Sensor Networks in {CIP/CIIP} Scenarios}, booktitle = {1st International Workshop on Critical Information Infrastructures Security (CRITIS{\textquoteright}06)}, series = {LNCS}, volume = {4347}, year = {2006}, pages = {166-178}, publisher = {Springer Berlin / Heidelberg}, organization = {Springer Berlin / Heidelberg}, abstract = {

It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures. However, a sensor network is highly vulnerable against any external or internal attacks, thus network designers must know which are the tools that they can use in order to avoid such problems. In this paper we describe in detail a procedure (the KMS Guidelines), developed under our CRISIS project, that allows network designers to choose a certain Key Management System, or at least to know which protocol need to improve in order to satisfy the network requirements.

}, keywords = {Critical Information Infrastructures, Key Infrastructures, Key Management, Sensor Networks}, issn = {0302-9743 (Print) 1611-3349 (Online)}, doi = {10.1007/11962977_14}, url = {http://www.springerlink.com/content/2458827107n14870/}, author = {Cristina Alcaraz and Rodrigo Roman} }