2009 International Symposium on Autonomous Decentralized Systems 2009
DOI: 10.1109/isads.2009.5207366
|View full text |Cite
|
Sign up to set email alerts
|

Secure decentralized data transfer against node capture attacks for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…3(b) shows the transmitted shares between a source node and a destination node with multiple paths A, B, and C. In this way, the original data can be transferred securely [3]. The secure dispersed data transfer method utilizes "light-weight" calculations such as the secret sharing scheme (the polynomial-based threshold scheme), and Lagrange's interpolation method (equations (2) and (3)). As a result, the secure dispersed data transfer method can be applied to devices with limited computational power.…”
Section: Outline Of the Secure Dispersed Data Transfer Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…3(b) shows the transmitted shares between a source node and a destination node with multiple paths A, B, and C. In this way, the original data can be transferred securely [3]. The secure dispersed data transfer method utilizes "light-weight" calculations such as the secret sharing scheme (the polynomial-based threshold scheme), and Lagrange's interpolation method (equations (2) and (3)). As a result, the secure dispersed data transfer method can be applied to devices with limited computational power.…”
Section: Outline Of the Secure Dispersed Data Transfer Methodsmentioning
confidence: 99%
“…Furthermore, they face the problem of keys being stolen or revoked. To counter this, the secure dispersed data transfer method has been proposed [2] [3] [4].…”
Section: Introductionmentioning
confidence: 99%
“…In [14], the authors proposed a new distribution method resilient against node capture attacks that utilizes the Secret Sharing Scheme (SSS) [15][16][17].…”
Section: Related Workmentioning
confidence: 99%
“…6 (2017) [ Fig. 1] Assumptions of secure decentralized data transfer against node capture attacks [14].…”
Section: 보안공학연구논문지 Journal Of Security Engineeringmentioning
confidence: 99%
“…Since, in ad hoc networks, data packets are forwarded by multi-hop transmission, they are susceptible to attacks. As we described in [3] [4], SRIDR can be used for the secure dispersed data transfer method [5] [6], i.e., security related method. Along with dynamic address routing (DART) [7] and its extensions, ATR and M-DART, [8] [9], SRIDR employs binary tree-structured routing ID that indicates a parent-child-based node's adjacency.…”
Section: Introductionmentioning
confidence: 99%