SPINS: Security protocols for sensor networks
From MaRDI portal
Publication:1859201
DOI10.1023/A:1016598314198zbMath1030.68814MaRDI QIDQ1859201
J. D. Tygar, Robert Szewczyk, Victor Wen, David E. Culler, Adrian Perrig
Publication date: 17 February 2003
Published in: Wireless Networks (Search for Journal in Brave)
cryptographymobile ad hoc networkssensor networksMANETauthentication of wireless communicationsecrecy and confidentialitysecure communication protocols
Network design and communication in computer systems (68M10) Cryptography (94A60) Computing methodologies and applications (68U99) Performance evaluation, queueing, and scheduling in the context of computer systems (68M20) Authentication, digital signatures and secret sharing (94A62)
Related Items
A power efficient aggregation of encrypted data in wireless sensor network, An efficient key management protocol for wireless sensor networks, Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks, A survey on position-based routing algorithms in wireless sensor networks, Quantum security in wireless sensor networks, On optimal cryptographic key derivation, A new protocol for the detection of node replication attacks in mobile wireless sensor networks, HORSIC: an efficient one-time signature scheme for wireless sensor networks, Modeling and verifying ad hoc routing protocols, Quantum Wireless Sensor Networks, Secure and highly-available aggregation queries in large-scale sensor networks via set sampling, Step-size sequence design for finite-time average consensus in secure wireless sensor networks, Security and Trust in Sensor Networks, A Distributed Data Storage Scheme for Sensor Networks, Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games, Chaos block cipher for wireless sensor network, CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks, ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks, Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks, Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks, Unnamed Item, SPINS, A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS, Formal models and analysis of secure multicast in wired and wireless networks, Rijndael for Sensor Networks: Is Speed the Main Issue?, Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks