2006
DOI: 10.1007/11964254_5
|View full text |Cite
|
Sign up to set email alerts
|

Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(22 citation statements)
references
References 8 publications
0
22
0
Order By: Relevance
“…If we have devices that cannot understand such messages, a simple proxy [10] can be used to translate the MAGNET Federation protocol primitives into other mechanisms such as SNMP or Command Line Interface protocols.…”
Section: ) Join Operationmentioning
confidence: 99%
“…If we have devices that cannot understand such messages, a simple proxy [10] can be used to translate the MAGNET Federation protocol primitives into other mechanisms such as SNMP or Command Line Interface protocols.…”
Section: ) Join Operationmentioning
confidence: 99%
“…Traffic analysis tools could be part of testing and debugging suites, or administration packages, and trust models serve as alternative approaches in some authentication protocols [115]. More general trust models are also notably promising in applications that involve humans, owning to their flexibility and ease of use.…”
Section: Limits To the Integrationmentioning
confidence: 99%
“…The authors in [20], [21], [22] propose to delegate the public-key operations of DTLS, TLS, and IKEv2 to an on-path gateway, respectively. These approaches share the end-to-end security keys with the gateway.…”
Section: Related Workmentioning
confidence: 99%