The 7th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (IEEE MASS 2010) 2010
DOI: 10.1109/mass.2010.5663902
|View full text |Cite
|
Sign up to set email alerts
|

On application of Host Identity Protocol in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…This measure can protect against evil initiators exhausting the responder by flooding I1 packets in a looping script, like TCP SYN attack. Although the effectiveness of puzzle mechanism is unclear in practice [13], we find it can relax the responder in dealing with aggressive packet retransmission in the noisy environment. ECDH handshake creates symmetric encryption key for subsequent data transmissions.…”
Section: Security Analysismentioning
confidence: 91%
See 1 more Smart Citation
“…This measure can protect against evil initiators exhausting the responder by flooding I1 packets in a looping script, like TCP SYN attack. Although the effectiveness of puzzle mechanism is unclear in practice [13], we find it can relax the responder in dealing with aggressive packet retransmission in the noisy environment. ECDH handshake creates symmetric encryption key for subsequent data transmissions.…”
Section: Security Analysismentioning
confidence: 91%
“…Host Identity Protocol (HIP) [11], an IETF standard, introduces a new protocol layer to establish secure signaling channel with inherent support for mobility. This protocol employs ECC [12] and has proven its feasibility on the real sensor node [13]. HIP Diet Exchange (HIP DEX) [14] is a variant of the HIP Base Exchange (HIP BEX) specifically designed for sensor devices with fewer cryptographic primitives.…”
Section: Introductionmentioning
confidence: 99%
“…The [19] base station in the wireless sensor network behaves as gateway between the network and external communication. The Base station is considered to be node having capability to reach wide communication range.…”
Section: A Base Stationmentioning
confidence: 99%
“…A sensor [18] node is the core component of a WSN which can take on multiple roles in a network, such as sensing; data storage; routing; and data processing. It is [19] assumed that sensor nodes has unique-id and are distributed randomly distributed across the network.…”
Section: A Base Stationmentioning
confidence: 99%
“…A host identity tag is attached with each nodes in the MANET for achieving authenticity and availability in the network [2]. One of authenticity protocol widely used in wireless networks are Host Identity Protocol(HIP) whch hides information about the source and destination nodes and prevents the tracking of trusted links between them.…”
Section: Introductionmentioning
confidence: 99%