2007
DOI: 10.1109/pccc.2007.358904
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Misused Keys in Wireless Sensor Networks

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…This makes public key based key management schemes a desirable candidate for WSNs. Liu et al [11] also propose schemes to detect misused keys in WSNs. Secrecy and authentication: Based on established keys, these are various kinds of authentication and privacy mechanisms in WSNs.…”
Section: Defense Mechanismmentioning
confidence: 99%
“…This makes public key based key management schemes a desirable candidate for WSNs. Liu et al [11] also propose schemes to detect misused keys in WSNs. Secrecy and authentication: Based on established keys, these are various kinds of authentication and privacy mechanisms in WSNs.…”
Section: Defense Mechanismmentioning
confidence: 99%
“…Recently, Liu and Dong proposed a scheme about detecting misused Keys in WSNs [5] to prevent these kinds of attacks. They defined the misused key under following three conditions.…”
Section: Introductionmentioning
confidence: 99%