2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems 2008
DOI: 10.1109/mahss.2008.4660130
|View full text |Cite
|
Sign up to set email alerts
|

Why is IPSec a viable option for wireless sensor networks

Abstract: Many issues still remain to be addressed in order to achieve acceptable security in Wireless Sensor Networks (WSNs). This necessity, together with the adoption of IPv6 on WSNs being defined at the 610wpan lvorking group of the IETF, motivates our investigation on the feasibility of the application of IPSec on sensor nodes. IPSec is already part of IPv6, which makes it a natural candidate to be directly employed or adapted for WSNs. We discuss results obtained from practical experiments on the usage of cryptogr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
28
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(29 citation statements)
references
References 14 publications
1
28
0
Order By: Relevance
“…Then we are realized that IPSec used in the Internet is more suitable compared to other proposed schemes. This standard has already demonstrated its performances in Internet environment and became mandatory component for IPv6 to ensure the end to end security [6].…”
Section: Related Workmentioning
confidence: 99%
“…Then we are realized that IPSec used in the Internet is more suitable compared to other proposed schemes. This standard has already demonstrated its performances in Internet environment and became mandatory component for IPv6 to ensure the end to end security [6].…”
Section: Related Workmentioning
confidence: 99%
“…[11]Stealing usernames and passwords during logging activities are vulnerable to attacks during authentication. [12] There are several security threats at different levels such as traffic analysis, spoofing of MAC addresses, flooding attacks etc.…”
Section: Related Workmentioning
confidence: 99%
“…(3) Comparison between our scheme and the TKH scheme: we set the total number in set C(c) to be 32, 64, 128, 256, 512, 1024 by designing (α, β, γ) as (2,5,3), (4,5,3), (2,7,9), (4,7,9), (8,7,9), and (16,7,9), respectively. Let q = 2 128 , t = 0.1c , and |p| = lg c. Each node can be identified by using lg c bits.…”
Section: Communication Overheadmentioning
confidence: 99%
“…Moreover, the length of B (|B| = (ω j + t + 1)lg p + lg q) is shorter than keys (|keys| = 3lg q). Figure 8 shows the total cost of rekeying group key when l(1 ≤ l ≤ 0.1c ) nodes are revoked for (2,5,3), (4,5,3), (2,7,9), (4,7,9), and (8,7,9) in our scheme. We can see that the total cost of rekeying group key increases as the total number of nodes increases.…”
Section: Communication Overheadmentioning
confidence: 99%
See 1 more Smart Citation