2017
DOI: 10.1016/j.future.2015.11.026
|View full text |Cite
|
Sign up to set email alerts
|

Secure group communication schemes for dynamic heterogeneous distributed computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…Identity authentication is mainly used to determine the sender of information and exchange communication keys between two communication parties. Since nodes in a WSN are relatively easy for attackers to capture, we can use identity authentication mechanisms to verify the captured nodes [12][13][14][15]. Due to the constrained computing and energy capabilities, identity authentication via a symmetric key algorithm is more feasible than the traditional approach based on public key encryption in WSNs [3,16].…”
Section: Related Workmentioning
confidence: 99%
“…Identity authentication is mainly used to determine the sender of information and exchange communication keys between two communication parties. Since nodes in a WSN are relatively easy for attackers to capture, we can use identity authentication mechanisms to verify the captured nodes [12][13][14][15]. Due to the constrained computing and energy capabilities, identity authentication via a symmetric key algorithm is more feasible than the traditional approach based on public key encryption in WSNs [3,16].…”
Section: Related Workmentioning
confidence: 99%
“…A particular use case of replay attack that retransmitted a legitimate plaintext set-point command after modifying it bypassed the DER client credentials and was successfully accepted by the device [126]. Different cryptographic techniques can prevent MITM and replay attacks considering the use of strong key distribution and exchange schemes [127]. It has also been shown through research that DER applications using TCP-based communications, by virtue of their three-way handshake and inclusion of the sequence number in their header, are less susceptible to replay than those using UDP.…”
Section: Key Observationsmentioning
confidence: 99%
“…Work within the Authentication space of IoTs has been significant -mainly in mechanisms to create and distribute keys efficiently and securely throughout a network [7]- [9]. Most of these solutions face significant issues with adaptable heterogenous networks where the nodes are ephemeral -either due to movement physical movement out of the network, addition to the environment, or destruction via some outside force.…”
Section: A Related Workmentioning
confidence: 99%