2013
DOI: 10.1109/jsyst.2012.2221900
|View full text |Cite
|
Sign up to set email alerts
|

State Machine-Based Security Fusion for Resource-Constrained Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Other schemes focus on efficiently providing authenticated encryption, like the Identity-based Cryptosystem (IBC) signcryption mechanisms presented by Fagen et al [42]. Related to the above is the relatively novel concept of security fusion, whereby weak point-to-point properties are combined in order to produce strong security properties in a resource-aware manner [43].…”
Section: Security Analysis and Considerationsmentioning
confidence: 99%
“…Other schemes focus on efficiently providing authenticated encryption, like the Identity-based Cryptosystem (IBC) signcryption mechanisms presented by Fagen et al [42]. Related to the above is the relatively novel concept of security fusion, whereby weak point-to-point properties are combined in order to produce strong security properties in a resource-aware manner [43].…”
Section: Security Analysis and Considerationsmentioning
confidence: 99%
“…Security fusion [20] is a novel framework in security for inherently resource-limited systems. Unlike traditional cryptographic schemes, the general approach here is to introduce lightweight primitives at the individual nodes that provide a strong aggregation to security properties at the systemlevel.…”
Section: A Security Fusionmentioning
confidence: 99%
“…Our earlier paper [20] introduces the concept of security fusion with a detailed description on a state machine-based architecture to realizing the framework. In this architecture, the basic idea is to have a challenge-response system that extracts a global security property from the response pattern of all the nodes.…”
Section: A Security Fusionmentioning
confidence: 99%
See 2 more Smart Citations