2009 International Conference on Availability, Reliability and Security 2009
DOI: 10.1109/ares.2009.147
|View full text |Cite
|
Sign up to set email alerts
|

Routing Protocol Security Using Symmetric Key Based Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Symmetric key cryptographic routing schemes provide security solutions for the various security threats in WBAN using a shared secret key for both encryption and decryption. These protocols are efficient, take less time for encryption/decryption process and have low overhead and communication cost [68]. The following sections discuss various symmetric key cryptographic routing protocols for WBANs.…”
Section: Symmetric Key Cryptographic Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Symmetric key cryptographic routing schemes provide security solutions for the various security threats in WBAN using a shared secret key for both encryption and decryption. These protocols are efficient, take less time for encryption/decryption process and have low overhead and communication cost [68]. The following sections discuss various symmetric key cryptographic routing protocols for WBANs.…”
Section: Symmetric Key Cryptographic Protocolsmentioning
confidence: 99%
“…Hybrid security framework [63] Secure and QoS Assurance Scheduling [64] Hybrid AuthenƟcaƟon and Key Establishment [65] Security Mechanism for Ɵer-1 and Ɵer-2 CommunicaƟons [66] Secure AA [68] Secure Health TeleMonitoring [69] Secure Routing protocols for WBAN Fig. 3 Classification of routing protocols based on different cryptosystems Fig.…”
Section: Asymmetric Key Cryptographic Protocolsmentioning
confidence: 99%
“…Key distribution, updating key, addressing collisionrelated issues, and reducing the cost of key creation are well discussed in earlier works [6][7][8] . Establishing key along with the secure routing protocols is discussed in previous researches [9][10][11] . Communication with more secured way and the issues on key generation and distribution in wireless and wireless sensor networks are also presented in existing research works 12,13 .…”
Section: Literature Surveymentioning
confidence: 99%
“…While this proposal avoids the use of cryptographic operations, it relies on expensive off-line secret exchange. To enable on-line distribution of secrets, Bruhadeshwar et al [117] presented key distribution protocols for [116]. Similar source and path validation methods were also presented in [118,119,120,121,122].…”
Section: Proposals Securing the Data Planementioning
confidence: 99%