Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking &Amp; Computing - MobiHoc '01 2001
DOI: 10.1145/501436.501438
|View full text |Cite
|
Sign up to set email alerts
|

Secure pebblenets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
95
0

Year Published

2005
2005
2009
2009

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 143 publications
(95 citation statements)
references
References 11 publications
0
95
0
Order By: Relevance
“…Most current approaches use some variation of pre-deploying symmetric keys. Amongst common proposals are those that use a global key shared by all nodes [18] [13], those in which every node shares a secret key with a base station [6], and those based on random key sharing [17].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most current approaches use some variation of pre-deploying symmetric keys. Amongst common proposals are those that use a global key shared by all nodes [18] [13], those in which every node shares a secret key with a base station [6], and those based on random key sharing [17].…”
Section: Related Workmentioning
confidence: 99%
“…Consequently the effects of key compromise only last as long as the compromised cluster is intact. Unlike proposals using the group key as a fixed globally shared key [18], the cluster key is time-limited and cluster-limited.…”
Section: Overview Of Our Security Modelmentioning
confidence: 99%
“…Recently, the problem of securing ad-hoc networks has received a great deal of welldeserved attention in the literature [5,6,9,29,30,33,42,48]. Somewhat surprisingly, however, in spite of its importance, the anonymity problem has not been addressed in wireless sensor networks.…”
Section: What Is Anonymity?mentioning
confidence: 99%
“…At the outset, per Principle 2 and 3, schemes like the pebblenets [54], the terminodes [55,56] and Luo et al's [57] are ruled out. The key management scheme we are recommending is based on Zhu et al's LEAP [58], extended according to our earlier analysis of the data link layer, the network layer and the application layer.…”
Section: E Cross-layermentioning
confidence: 99%