2006
DOI: 10.1007/11963271_5
|View full text |Cite
|
Sign up to set email alerts
|

Securing Communication Trees in Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Our approach utilize secret keys to ensure authentication and privacy in one-to-one and one-tomany communication while broadcast exclusion, based on polynomial interpolation, ensures secure way for network management and group key exchange. Similar to [7,8,23] nodes that miss rekeying messages (e.g. due to lossy links or network partitions) or join the network are able to get group key through local communication.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Our approach utilize secret keys to ensure authentication and privacy in one-to-one and one-tomany communication while broadcast exclusion, based on polynomial interpolation, ensures secure way for network management and group key exchange. Similar to [7,8,23] nodes that miss rekeying messages (e.g. due to lossy links or network partitions) or join the network are able to get group key through local communication.…”
Section: Related Workmentioning
confidence: 99%
“…New secret key approach was recently presented by Dimitriou [8] who proposed an algorithm for establishing communication trees that ensure security and authentication. His proposal allows to change network structure, node addition and exclusion.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Authors in [5] propose a protocol to secure tree construction, based on braodcast key to authenticate neighboring nodes. However, although this protocol is resilient to node replication attack, the protocol cannot protect the transmitted routing information from being altered or forged when an adversary compromise a node.…”
Section: Introductionmentioning
confidence: 99%
“…In the literature, some solutions [2][3][4][5] have been designed to build a reliable routing topology. Authors in [5] propose a protocol to secure tree construction, based on braodcast key to authenticate neighboring nodes.…”
Section: Introductionmentioning
confidence: 99%