Proceedings of the Second ACM Conference on Wireless Network Security 2009
DOI: 10.1145/1514274.1514277
|View full text |Cite
|
Sign up to set email alerts
|

Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
17
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(18 citation statements)
references
References 14 publications
1
17
0
Order By: Relevance
“…A similar evaluation of the security mechanisms applicable to CC2420 equipped TelosB node was presented in [13]. However, our results differ slightly, presumably due to different implementations.…”
Section: A Related Worksupporting
confidence: 60%
See 2 more Smart Citations
“…A similar evaluation of the security mechanisms applicable to CC2420 equipped TelosB node was presented in [13]. However, our results differ slightly, presumably due to different implementations.…”
Section: A Related Worksupporting
confidence: 60%
“…In contrast to [13], where the implementation is not available, our code can be found at SourceForge [14]. While [13] does not report the possible number of iterations for a measurement (if any), it uses the same methodology in the form of the microcontroller timer. Additionally, the paper does not report the source of or overall settings for the memory measurements.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Many works in WSNs set the default packet size to about 40 bytes [6], [7]. When the average number of hops from the source node to the sink is 10 and the length of node ID is 10, the average overhead is ( 10 i (1 + 10) · i)/10 = 42 bits = 8 bytes if we set k to 1.…”
Section: Discussionmentioning
confidence: 99%
“…In this section we show how to use the Energy Bucket to compare the energy and time consumption of the CC2420 radio inline Counter and Cipher Block Chaining Message Authentication Code (CCM) mode security mechanism [18] to a similar software implementation 1 when used with packet transmission. It is known that the CC2420 inline CCM security mechanism will outperform a similar software implementation with relation to a time metric [19], but the fact that the radio could be turned off when doing the software security operation could favour it with relation to an energy metric.…”
Section: B Comparison: Cc2420 Vs Msp430 Ccm Securitymentioning
confidence: 99%