2008
DOI: 10.1007/978-3-540-89641-8_26
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Directed Diffusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…This scheme is not robust against active attacks as all sensor nodes are not capable of authenticating their attackers. In [11] authenticated directed diffusion protocol is proposed that handles denial of service attack by using one way hash function to establish a key chain. In [12] a trust framework for routing protocols is proposed.…”
Section: Proposed Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…This scheme is not robust against active attacks as all sensor nodes are not capable of authenticating their attackers. In [11] authenticated directed diffusion protocol is proposed that handles denial of service attack by using one way hash function to establish a key chain. In [12] a trust framework for routing protocols is proposed.…”
Section: Proposed Solutionsmentioning
confidence: 99%
“…node k combines the recommendation about node j from multiple nodes i using equations (10), (11) and (12) respectively.…”
Section: G Algorithmmentioning
confidence: 99%