146
Voted
ESAS
15 years 4 months ago
2004 Springer
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
137
Voted
ESAS
15 years 6 months ago
2004 Springer
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
121
click to vote
ESAS
15 years 6 months ago
2004 Springer
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
112
Voted
ESAS
15 years 6 months ago
2004 Springer
Abstract. Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. However, deployi...
101
click to vote
ESAS
15 years 6 months ago
2004 Springer
Abstract. This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and phy...
|