SPINS: Security protocols for sensor networks
DOI10.1023/A:1016598314198zbMATH Open1030.68814MaRDI QIDQ1859201FDOQ1859201
Authors: Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David Culler
Publication date: 17 February 2003
Published in: Wireless Networks (Search for Journal in Brave)
Recommendations
cryptographysensor networksmobile ad hoc networksMANETauthentication of wireless communicationsecrecy and confidentialitysecure communication protocols
Computing methodologies and applications (68U99) Cryptography (94A60) Performance evaluation, queueing, and scheduling in the context of computer systems (68M20) Network design and communication in computer systems (68M10) Authentication, digital signatures and secret sharing (94A62)
Cited In (41)
- A power efficient aggregation of encrypted data in wireless sensor network
- Security and trust in sensor networks
- Secure sensor networks for perimeter protection.
- A survey on position-based routing algorithms in wireless sensor networks
- Code updates based on minimal backbone and group key management for secure sensor networks
- A distributed data storage scheme for sensor networks
- CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks
- Title not available (Why is that?)
- SecLEACH-on the security of clustered sensor networks
- Chaos block cipher for wireless sensor network
- Secure collection tree protocol for tamper-resistant wireless sensors
- Step-size sequence design for finite-time average consensus in secure wireless sensor networks
- Quantum Wireless Sensor Networks
- Accelerating signature-based broadcast authentication for wireless sensor networks
- An efficient key management protocol for wireless sensor networks
- A new protocol for the detection of node replication attacks in mobile wireless sensor networks
- Quantum security in wireless sensor networks
- A clean slate approach to secure wireless networking
- A chaos-based secure cluster protocol for wireless sensor networks
- Negotiation-based protocols for disseminating information in wireless sensor networks
- HORSIC: an efficient one-time signature scheme for wireless sensor networks
- Modeling and verifying ad hoc routing protocols
- Sec-TMP: A secure topology maintenance protocol for event delivery enforcement in WSN
- Principles of Distributed Systems
- SPINS
- Linear approaches to resilient aggregation in sensor networks
- Search on security in sensor networks
- ECM-IBS: a Chebyshev map-based broadcast authentication for wireless sensor networks
- A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
- Formal models and analysis of secure multicast in wired and wireless networks
- Combinatorial design of key distribution mechanisms for wireless sensor networks
- Towards secure and practical MACs for body sensor networks
- Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks
- Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
- Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
- Rijndael for sensor networks: is speed the main issue?
- Distance-Avoiding Sequences for Extremely Low-Bandwidth Authentication
- Efficient and reliable post-quantum authentication
- On optimal cryptographic key derivation
- BAP: Broadcast Authentication Using Cryptographic Puzzles
- Dealing with liars: misbehavior identification via Rényi-Ulam games
This page was built for publication: SPINS: Security protocols for sensor networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1859201)