Proceedings of the 31st Annual Computer Security Applications Conference 2015
DOI: 10.1145/2818000.2818002
|View full text |Cite
|
Sign up to set email alerts
|

Handling Reboots and Mobility in 802.15.4 Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Therefore, to discover unknown bugs, researchers have fuzzified several stateful protocols (e.g., snmp, ftp, ssl, bgp, and smb) [79,167] and evaluated simple radio protocols (e.g., ZigBee, ZWave, WiFi, and Bluetooth) [80]. They also optimized these protocols, such as the 802.15.4 protocol [82], constrained application protocol (CoAP), and MQ telemetry transport (MQTT) protocol [81], to enhance their reliability and robustness.…”
Section: General Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, to discover unknown bugs, researchers have fuzzified several stateful protocols (e.g., snmp, ftp, ssl, bgp, and smb) [79,167] and evaluated simple radio protocols (e.g., ZigBee, ZWave, WiFi, and Bluetooth) [80]. They also optimized these protocols, such as the 802.15.4 protocol [82], constrained application protocol (CoAP), and MQ telemetry transport (MQTT) protocol [81], to enhance their reliability and robustness.…”
Section: General Scenariosmentioning
confidence: 99%
“…Studies about control have mainly been performed at the application layer and include device pairing, cloud service management, access control, and trusted computing. The other works mainly address key management [19,82] and encrypted communication schemes [83,106].…”
Section: Controlmentioning
confidence: 99%
“…SPINS (Security Protocol for Sensor Networks) scheme provides security for wireless sensor communication and obtains keys from the pre‐distributed master keys. Although AKES (Adaptive Key Establishment Scheme) system uses PAN ID and address of the sensor for authentication and key distribution, it follows pre‐distribution of keys to derive pairwise session keys. Unlike our LAUP, AKES uses the address of sensors to get the shared secret keys, whereas LAUP uses MAC ID of sensors.…”
Section: Related Workmentioning
confidence: 99%
“…SPINS (Security Protocol for Sensor Networks) [12] scheme provides security for wireless sensor communication also obtains keys from the pre-distributed master keys. Although AKES (Adaptive Key Establishment Scheme) [13] system uses PAN ID and address of the sensor for authentication and key distribution, it follows predistribution of keys to derive pairwise session keys. Unlike our LAUP, AKES uses the address of sensors to get the shared secret keys, whereas LAUP uses MAC ID of sensors.…”
Section: Related Workmentioning
confidence: 99%