Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security 2006
DOI: 10.1145/1128817.1128864
|View full text |Cite
|
Sign up to set email alerts
|

An efficient broadcast authentication scheme in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Schemes proposed in [16,17,18,19,20] are based on one-time signature mechanism. Those schemes are computationally efficient as signatures only rely on one-way functions without trapdoors.…”
Section: Related Workmentioning
confidence: 99%
“…Schemes proposed in [16,17,18,19,20] are based on one-time signature mechanism. Those schemes are computationally efficient as signatures only rely on one-way functions without trapdoors.…”
Section: Related Workmentioning
confidence: 99%
“…There exist several approaches and improvements for authentication based on one time signatures. Besides the one applied by us [11], Chang et al propose improvements for efficient broadcast authentication in wireless sensor networks [5]. An approach and tool for modeling safety and security interdependencies via Boolean logic Driven Markov Processes (BDMP) is shown in [9], following the analysis method known from fault and attack trees.…”
Section: Related Workmentioning
confidence: 99%
“…First, in applications where the receivers are resource constrained, the public key size of HORS is too large, which means a high storage overhead at the receiver side. Though some recent work [3] improves the public key size of HORS, the scheme cannot be applied to one-way chain based authentication protocols [19], [20], [28] and thus the distribution of the public key becomes an issue. Second, the signature size of HORS is too large for the wide area protection application.…”
Section: E Literature Reviewmentioning
confidence: 99%