2010
DOI: 10.1016/j.adhoc.2010.01.003
|View full text |Cite
|
Sign up to set email alerts
|

Secure key loss recovery for network broadcast in single-hop wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…There are several directions for future work: we have undertaken further work [11,12] to extend our scheme to multihop networks where transit nodes may be susceptible to physical compromise. We have also extended, prototyped, and analysed our scheme [25] for recovery from lost keys. Finally, we are prototyping our scheme for broadcast applications in which the data is dynamic, unlike the network programming application considered in this paper wherein the bulk data is known before hand.…”
Section: Discussionmentioning
confidence: 99%
“…There are several directions for future work: we have undertaken further work [11,12] to extend our scheme to multihop networks where transit nodes may be susceptible to physical compromise. We have also extended, prototyped, and analysed our scheme [25] for recovery from lost keys. Finally, we are prototyping our scheme for broadcast applications in which the data is dynamic, unlike the network programming application considered in this paper wherein the bulk data is known before hand.…”
Section: Discussionmentioning
confidence: 99%
“…The implementation of the gateway-level trust has been discussed in Section 3.2. These nodes use the WMN's authentication and deauthentication algorithms that have been discussed in Section 3.3 to ensure that mesh routers can connect securely to the network [26,27].…”
Section: Ddos Attack Prevention Mechanism (Dapm)mentioning
confidence: 99%
“…Þ message, and it forwards signed DARP i,j to router r ij through disjoint paths (t d ); also, the r i,j deauthentication information disseminates to other group heads and its group members [27][28][29].…”
Section: Authentication and Deauthentication At Router Levelmentioning
confidence: 99%
See 1 more Smart Citation