2010 Fourth International Conference on Network and System Security 2010
DOI: 10.1109/nss.2010.32
|View full text |Cite
|
Sign up to set email alerts
|

Energy Friendly Integrity for Network Coding in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(21 citation statements)
references
References 28 publications
0
21
0
Order By: Relevance
“…This may incur a certain authentication cost in energy at the relays. As shown in [8] performing verification is as energy expensive as sending plus receiving a message. However, in some cases it may be beneficial to the overall network energy performance since polluted messages are not uselessly forwarded towards the destination.…”
Section: Authentication Strategiesmentioning
confidence: 99%
See 3 more Smart Citations
“…This may incur a certain authentication cost in energy at the relays. As shown in [8] performing verification is as energy expensive as sending plus receiving a message. However, in some cases it may be beneficial to the overall network energy performance since polluted messages are not uselessly forwarded towards the destination.…”
Section: Authentication Strategiesmentioning
confidence: 99%
“…It has been established by Apavatjrut et al in [8] that MACs based on the classical primitives that are block ciphers or hash functions imply an energetic cost too important for the relaying nodes of a WSN. The same observation holds for the underlying primitives (exponentiation) used in [7].…”
Section: Mac Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…Some are for resisting eavesdropping attacks [6][7][8] , and the others are for resisting pollution attacks [9][10][11][12][13][14] , both of which are external attacks. Especially, Cascella et al 5 proposed a weak data secrecy (WDS) scheme via obfuscation used in P2P content distribution systems.…”
Section: Introductionmentioning
confidence: 99%