2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.26
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Keyspace analysis aims to ascertain the means of securing the keyspace and anticipating brute-force attacks. The keyspace must be sufficiently largegreater than 2 100 -to anticipate brute-force attacks [22].…”
Section: Keyspace Analysismentioning
confidence: 99%
“…Keyspace analysis aims to ascertain the means of securing the keyspace and anticipating brute-force attacks. The keyspace must be sufficiently largegreater than 2 100 -to anticipate brute-force attacks [22].…”
Section: Keyspace Analysismentioning
confidence: 99%
“…In our recent work [17], we presented a tunneling protocol adapted for wireless sensor networks. In this work, we analyze more security cases such as dynamic integration of newly appeared sensors.…”
Section: Related Workmentioning
confidence: 99%
“…So the security of this protocol is yet to be further improved. Some authors propose a distributed authentication scheme [5,6]. However, a lot of nodes are involved.…”
Section: Introductionmentioning
confidence: 99%