Luk et al., 2007 - Google Patents
MiniSec: a secure sensor network communication architectureLuk et al., 2007
View PDF- Document ID
- 3042733406711781468
- Author
- Luk M
- Mezzour G
- Perrig A
- Gligor V
- Publication year
- Publication venue
- Proceedings of the 6th international conference on Information processing in sensor networks
External Links
Snippet
Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay protection. Secure sensor network link layer protocols such as Tiny-Sec [10] and ZigBee [24] enjoy significant attention in the community …
- 238000004891 communication 0 title abstract description 37
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—INDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B60/00—Information and communication technologies [ICT] aiming at the reduction of own energy use
- Y02B60/50—Techniques for reducing energy-consumption in wireless communication networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Luk et al. | MiniSec: a secure sensor network communication architecture | |
Nilsson et al. | Key management and secure software updates in wireless process control environments | |
US8254581B2 (en) | Lightweight key distribution and management method for sensor networks | |
EP2232809B1 (en) | Secure wireless communications system and related method | |
US20140365775A1 (en) | System and Method for Mitigation of Denial of Service Attacks in Networked Computing Systems | |
WO2007059558A1 (en) | Wireless protocol for privacy and authentication | |
CN116321129B (en) | Lightweight dynamic key-based power transaction private network communication encryption method | |
CN110380848B (en) | Secure communication method between fixed sensor node and mobile sink node in underwater acoustic communication | |
US20070055870A1 (en) | Process for secure communication over a wireless network, related network and computer program product | |
Agosta et al. | Cyber-security analysis and evaluation for smart home management solutions | |
Yu et al. | A secure communication protocol between sensor nodes and sink node in underwater acoustic sensor networks | |
Michell et al. | State based key hop protocol: a lightweight security protocol for wireless networks | |
McGrew | Low power wireless scenarios and techniques for saving bandwidth without sacrificing security | |
Ma et al. | A new mechanism for achieving secure and reliable data transmission in wireless sensor networks | |
Misic et al. | Performance implications of periodic key exchanges and packet integrity overhead in an 802.15. 4 beacon enabled cluster | |
Zhang et al. | Energy cost of cryptographic session key establishment in a wireless sensor network | |
Krontiris et al. | WSN link-layer security frameworks | |
Teaca | Design of an encryption protocol for BLE advertising traffic | |
Narayanan et al. | TLS cipher suite: Secure communication of 6LoWPAN devices | |
Soliman et al. | An efficient application of a dynamic crypto system in mobile wireless security | |
Cichoń et al. | From key predistribution to key redistribution | |
Beyah et al. | Security in Ad-hoc and Sensor Networks | |
US20250168630A1 (en) | Apparatus and method for drone control data security | |
Yu et al. | A lightweight secure data transmission protocol for resource constrained devices | |
Bajpai et al. | Surveillance Using Elliptic Curve Cryptography |