[go: up one dir, main page]

Luk et al., 2007 - Google Patents

MiniSec: a secure sensor network communication architecture

Luk et al., 2007

View PDF
Document ID
3042733406711781468
Author
Luk M
Mezzour G
Perrig A
Gligor V
Publication year
Publication venue
Proceedings of the 6th international conference on Information processing in sensor networks

External Links

Snippet

Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay protection. Secure sensor network link layer protocols such as Tiny-Sec [10] and ZigBee [24] enjoy significant attention in the community …
Continue reading at ptolemy.berkeley.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BINDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B60/00Information and communication technologies [ICT] aiming at the reduction of own energy use
    • Y02B60/50Techniques for reducing energy-consumption in wireless communication networks

Similar Documents

Publication Publication Date Title
Luk et al. MiniSec: a secure sensor network communication architecture
Nilsson et al. Key management and secure software updates in wireless process control environments
US8254581B2 (en) Lightweight key distribution and management method for sensor networks
EP2232809B1 (en) Secure wireless communications system and related method
US20140365775A1 (en) System and Method for Mitigation of Denial of Service Attacks in Networked Computing Systems
WO2007059558A1 (en) Wireless protocol for privacy and authentication
CN116321129B (en) Lightweight dynamic key-based power transaction private network communication encryption method
CN110380848B (en) Secure communication method between fixed sensor node and mobile sink node in underwater acoustic communication
US20070055870A1 (en) Process for secure communication over a wireless network, related network and computer program product
Agosta et al. Cyber-security analysis and evaluation for smart home management solutions
Yu et al. A secure communication protocol between sensor nodes and sink node in underwater acoustic sensor networks
Michell et al. State based key hop protocol: a lightweight security protocol for wireless networks
McGrew Low power wireless scenarios and techniques for saving bandwidth without sacrificing security
Ma et al. A new mechanism for achieving secure and reliable data transmission in wireless sensor networks
Misic et al. Performance implications of periodic key exchanges and packet integrity overhead in an 802.15. 4 beacon enabled cluster
Zhang et al. Energy cost of cryptographic session key establishment in a wireless sensor network
Krontiris et al. WSN link-layer security frameworks
Teaca Design of an encryption protocol for BLE advertising traffic
Narayanan et al. TLS cipher suite: Secure communication of 6LoWPAN devices
Soliman et al. An efficient application of a dynamic crypto system in mobile wireless security
Cichoń et al. From key predistribution to key redistribution
Beyah et al. Security in Ad-hoc and Sensor Networks
US20250168630A1 (en) Apparatus and method for drone control data security
Yu et al. A lightweight secure data transmission protocol for resource constrained devices
Bajpai et al. Surveillance Using Elliptic Curve Cryptography