Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Secure Pebblenets: The Problem. ♢Secure pebblenets should guarantee data traffic confidentiality and authenticity. ♢Data traffic is encrypted by all pebbles by.
We consider the problem of securing communication in large ad hoc networks, i.e., wireless networks with no fixed, wired infrastructure and with multi-hop ...
We consider the problem of securing communication in large ad hoc networks, i.e., wireless networks with no fixed, wired infrastructure and with multi-hop ...
We consider the problem of securing communication in large ad hoc networks, ie, wireless networks with no fixed, wired infrastructure and with multi-hop routes.
We consider the problem of securing communication in large ad hoc networks, i.e., wireless networks with no fixed, wired infrastructure and with multi-hop ...
Summary: This work proposes a key management scheme to periodically update the symmetric keys used by all pebbles, combining mobility-adaptive clustering ...
TL;DR: a secure on-demand routing protocol for ad hoc networks that can be used to connect ad-hoc networks to each other without disrupting existing networks. .
People also ask
Secure pebblenets [3] relies on a tamper resistance assumption to protect a shared secret key. SEKEN [17] requires the establishment and maintenance of the ...
S. Basagni, K. Herrin, et al., “Secure Pebblenets,” Proceedings of the 2nd ACM International Symposium on Mobile ad hoc Networking & Computing, Long Beach, ...
♢SEAD, Secure pebblenets: Secure routing for ad-hoc network using symmetric key cryptography. ♢Punishment, reporting and grudges against selfish nodes ...