2003 International Conference on Parallel Processing Workshops, 2003. Proceedings.
DOI: 10.1109/icppw.2003.1240395
|View full text |Cite
|
Sign up to set email alerts
|

LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks

Abstract: . LKHW : a directed diffusionbased secure multicast scheme for wireless sensor networks. In 32nd International Conference on Parallel Processing Workshops (Proceedings ICPP 2003 Workshops, Kaohsiung, Taiwan, October 6-9, 2003. IEEE Computer Society. DOI: 10.1109/ICPPW.2003 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
82
0
3

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 96 publications
(87 citation statements)
references
References 20 publications
0
82
0
3
Order By: Relevance
“…In the literature, there has been some work that protects previously existent routing protocols such as directed diffusion [22]. Another branch of research focused on discovering new protection techniques.…”
Section: Routingmentioning
confidence: 99%
“…In the literature, there has been some work that protects previously existent routing protocols such as directed diffusion [22]. Another branch of research focused on discovering new protection techniques.…”
Section: Routingmentioning
confidence: 99%
“…In this paper we use this graph for t = O(log N ), therefore the property above can be checked explicitly in time polynomial in N . This gives a Las Vegas algorithm for constructing graphs D t with a polynomial expected running time 17 . We can also show the following.…”
Section: Theorem 4 ([24]mentioning
confidence: 99%
“…[28,29,13,8,35,17] and many more). These are proof systems where a verifier sends a file F to a prover, and later the prover can convince the verifier that it really stored or received the file.…”
Section: Introductionmentioning
confidence: 99%
“…NB: the size of q= key size = the size of the polynomial coefficients LKH [3] is a well-known and basic scheme on which several group rekeying schemes are based [40,4,41,14,15,5,6]. TKH [5] is a group rekeying scheme that uses the concept of matching the physical topology to the logical key hierarchy.…”
Section: Notations Meaning Tmentioning
confidence: 99%