2014
DOI: 10.1007/978-3-642-41674-3_55
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Open Interface Function in USN Service Middleware System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Attackers can intercept packets that are transmitted during the authentication and distribution of the session key between sensor nodes, and then replay them after some time. Because the system proposed in this paper generates a new nonce value for every authentication attempt, no authentication is established if an attacker replays the packets after a time interval [ 26 , 27 , 28 , 29 , 30 ].…”
Section: Proposed Security Schemementioning
confidence: 99%
“…Attackers can intercept packets that are transmitted during the authentication and distribution of the session key between sensor nodes, and then replay them after some time. Because the system proposed in this paper generates a new nonce value for every authentication attempt, no authentication is established if an attacker replays the packets after a time interval [ 26 , 27 , 28 , 29 , 30 ].…”
Section: Proposed Security Schemementioning
confidence: 99%