2013
DOI: 10.1007/978-3-319-04166-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Definition and Development of a Topology-Based Cryptographic Scheme for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
14
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 9 publications
1
14
0
Order By: Relevance
“…Our method for sure is slower and less precise (since it is an approximation) than the Marsaglia's method, anyway it is a valid alternative for the cases where m varies over time, giving a good trade-off between precision computing speed. A possible application filed of the proposed algorithm is the filed of embedded systems and Wireless Sensor Networks (WSN) [20]- [21], where the aspect just mentioned has its importance.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our method for sure is slower and less precise (since it is an approximation) than the Marsaglia's method, anyway it is a valid alternative for the cases where m varies over time, giving a good trade-off between precision computing speed. A possible application filed of the proposed algorithm is the filed of embedded systems and Wireless Sensor Networks (WSN) [20]- [21], where the aspect just mentioned has its importance.…”
Section: Discussionmentioning
confidence: 99%
“…It is possible to notice that the approximations obtained by the WH approach (20) and (21) are better than the Stirling formula (22). In particular, the higher-order WH approximation (21) is characterized by a relative error decreasing as α −2 , similarly to the approximation obtained including the first two terms of the Stirling series (23).…”
Section: Considerations On Wh-type Approximations For the Gamma Randomentioning
confidence: 96%
“…The paper shows how k‐means clustering and LLM may be coupled for the detection of DNS tunneling. Future work includes the evaluation of other cyber attacks, such as Denial of Service and malware in different contexts (eg, sensor networks). Preliminary results on the Kddcup data set show promising performance to overcome the high dimensionality of the space of features.…”
Section: Discussionmentioning
confidence: 99%
“…Other schemes can be found in [5]. In [25], [29] and [30], we have proposed a family of novel schemes called TAKS (Topology Authenticated Key Scheme) to generate topology authenticated keys for handling cryptographic aspects in resource constrained deployments of WSN. TAKS cryptographic scheme allows to authenticate each message exchanged in the network referring to a certified topology of the network.…”
Section: Security In Ieee 802154 Networkmentioning
confidence: 99%
“…TAKS cryptographic scheme allows to authenticate each message exchanged in the network referring to a certified topology of the network. Since TAKS provides good results from both performance and security points of view [25], its usage in IEEE 802.15.4 networks is very encouraged. The complexity and distributed nature of a WSN makes cryptography not sufficient to ensure network security.…”
Section: Security In Ieee 802154 Networkmentioning
confidence: 99%