2005
DOI: 10.21236/ada442043
|View full text |Cite
|
Sign up to set email alerts
|

Constraints and Approaches for Distributed Mobile AD-HOC Network Security

Abstract: REPORT DOCUMENTATION PAGE Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…This simplifying assumption was verified by Yee Wei Law et al in [17]. For the energy cost of SHA-1 algorithm, we use the implementation results of Patrick W. Fitzgibbons et al [10]. They implemented SHA-1 on WINS node.…”
Section: Computation Energy Costmentioning
confidence: 95%
See 4 more Smart Citations
“…This simplifying assumption was verified by Yee Wei Law et al in [17]. For the energy cost of SHA-1 algorithm, we use the implementation results of Patrick W. Fitzgibbons et al [10]. They implemented SHA-1 on WINS node.…”
Section: Computation Energy Costmentioning
confidence: 95%
“…Also, the energy costs of both the Kerberos and ECDH-ECDSA on MICAz as well as TelosB nodes are analyzed. Patrick W. Fitzgibbons et al [10] investigated the implementation of existing typical protocol (such as Kerberos) on resource-restrained sensor nodes. The energy of related protocols is evaluated on several exiting sensor motes.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations