Back to Results
First PageMeta Content
Computing / Telecommunications engineering / Key distribution / Key management / Wireless mesh network / Public-key cryptography / ANT / Sensor node / Elliptic curve Diffie–Hellman / Wireless sensor network / Wireless networking / Technology


Securing Network Access in Wireless Sensor Networks* Kun Sun§ § An Liu†
Add to Reading List

Document Date: 2011-11-09 13:26:22


Open Document

File Size: 424,58 KB

Share Result on Facebook

City

Zurich / Vancouver / Rockville / /

Company

nesC / AES / Wireless Sensor Networks / Algorithms Keywords Sensor Networks / Computer-Communication Networks / Static Sensor Networks / INTRODUCTION Wireless / Low Rate Wireless Personal Area Networks / Distributed Sensor Networks / Intelligent Automation Inc. / Case / /

Country

Switzerland / /

Currency

pence / USD / /

/

Facility

Java Data Structure Library / Computer Science North Carolina State University / Rice University / /

IndustryTerm

Wireless Medium Access Control / fixed key establishment algorithm / sensor network applications / polynomial-based weak authentication protocols / gateway applications / ephemeral key agreement algorithm / real-time applications / message communications / fixed key agreement algorithm / software modules / ephemeral key establishment algorithm / secure and efficient solution / large wireless mesh networks / energy consumption / sensor networks / software implementation / mesh network / wireless ad hoc networks / radio chip / sensor applications / assignment algorithm / subset finding algorithm / experimental sensor network / less energy / subset cover finding algorithm / disjointed groups / wireless packets / software solutions / security protocols / sensor network / /

OperatingSystem

TinyOS / DoS / /

Organization

Peng Ning† Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh / Rice University / Department of Computer Science / Certificate Authority / Department of Homeland Security / Maughan‡ Science & Technology Directorate Department of Homeland Security / /

Person

Chris Karlof / David Wagner / Naveen Sastry / /

Position

manager / General / controller of the group / Imote2 Graphics Controller / Private / controller / /

Product

Self-Certified ECDH / Subset Difference Method / Merkle Hash Tree / Hardware Modules Imote2 / the hardware platform / Hardware Modules Imote2 / /

ProgrammingLanguage

Java / /

ProvinceOrState

California / Maryland / /

Technology

fixed key establishment algorithm / RAM / Subset-Cover algorithm / Fixed Key algorithm / key exchange protocol / 1.2 Self-Certified ECDH We implement Self-Certified ECDH protocol / low power PXA271 XScale processor / fixed key agreement algorithm / using Self-Certified ECDH protocol / key assignment algorithm / radio chip / SelfCertified ECDH protocol / Self-Certified ECDH protocol / private key / security protocols / secret key / Key algorithm / pdf / encryption / cryptography / CC2420 RF chip / public key / subset finding algorithm / Java / ephemeral key agreement algorithm / 2.1 Network Admission Control We use Self-Certified ECDH protocol / CTR mode encryption / subset cover finding algorithm / process control system / ephemeral key establishment algorithm / Ephemeral Key algorithm / polynomial-based weak authentication protocols / /

URL

http /

SocialTag