2017
DOI: 10.1504/ijitst.2017.091514
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating privacy and security in military application based on opportunistic sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The simplest form of key pre-distribution involves the use of a single key network-wide, allowing any pair of nodes to connect effectively, but the compromise of any node could crash the entire system [17,18]. This paper proposes a polynomial key management scheme, which provides enough security that the disclosure of any single node will not reveal the secrets of other nodes.…”
Section: Introductionmentioning
confidence: 99%
“…The simplest form of key pre-distribution involves the use of a single key network-wide, allowing any pair of nodes to connect effectively, but the compromise of any node could crash the entire system [17,18]. This paper proposes a polynomial key management scheme, which provides enough security that the disclosure of any single node will not reveal the secrets of other nodes.…”
Section: Introductionmentioning
confidence: 99%
“…ONs apply to many real-life scenarios such as wildlife tracking [1], sensor networks [5], military networks [6], intermittent Internet connectivity [7], crowd management [8], emergency crises [9], etc.…”
mentioning
confidence: 99%