2010 IEEE/ACM Int'l Conference on Green Computing and Communications &Amp; Int'l Conference on Cyber, Physical and Social Compu 2010
DOI: 10.1109/greencom-cpscom.2010.92
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Secure Routing Protocol for Wireless Sensor Networks Using Multicasting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…During the packet transmission or reception each sensor node holds a SAD as in Step (4, 10). SAD will be used to get the information about SPI, keys, algorithms, and so forth as shown in Step (3,9). The node looks up the corresponding security association and fetches the necessary keys to apply security to the IP packet.…”
Section: Ipsec Security For 6lowpanmentioning
confidence: 99%
See 1 more Smart Citation
“…During the packet transmission or reception each sensor node holds a SAD as in Step (4, 10). SAD will be used to get the information about SPI, keys, algorithms, and so forth as shown in Step (3,9). The node looks up the corresponding security association and fetches the necessary keys to apply security to the IP packet.…”
Section: Ipsec Security For 6lowpanmentioning
confidence: 99%
“…Until now, the IPSec protocol has been used to secure the end-to-end communication between IPv6 hosts whereas no standardized solution has been proposed to ensure end-to-end security in 6LoWPANs, except some proposals such as TinySec [2] and MS-SPIN [3]. Hence, it would be interesting to apply the IPSec protocol to 6LoWPANs and adapt it in order to reinforce the security in constrained environments.…”
Section: Introductionmentioning
confidence: 99%
“…For the secure routing, Ibriq J et al describes a secure hierarchical energy-efficient routing protocol, which provides secure communication at the network layer utilizing a probabilistic broadcast mechanism and a three-level hierarchical clustering architecture [19]. Dhurandher SK et al proposed a secure SPIN (MS-SPIN) to address the security issue in SPIN protocol [20].…”
Section: Related Workmentioning
confidence: 99%
“…Dhurandher SK et al . proposed a secure SPIN (MS‐SPIN) to address the security issue in SPIN protocol .…”
Section: Related Workmentioning
confidence: 99%
“…From the IPv6 hosts side, the IPSec protocol is supported to secure the end-to-end communication. From the 6LoWPAN mote side, there is no standardized solution offering the end-to-end security unlike secure routing standards and protocols TinySec (Karlof et al, 2004) and MS-SPIN (Dhurandher et al, 2010). Hence, it would be interesting to adapt the IPSec protocol in order to ensure an optimized security in constrained environments.…”
Section: Introductionmentioning
confidence: 96%