View Document Preview and Link
Document Date: 2011-11-09 13:26:22 Open Document File Size: 424,58 KB Share Result on Facebook
City Zurich / Vancouver / Rockville / / Company nesC / AES / Wireless Sensor Networks / Algorithms Keywords Sensor Networks / Computer-Communication Networks / Static Sensor Networks / INTRODUCTION Wireless / Low Rate Wireless Personal Area Networks / Distributed Sensor Networks / Intelligent Automation Inc. / Case / / Country Switzerland / / Currency pence / USD / / / Facility Java Data Structure Library / Computer Science North Carolina State University / Rice University / / IndustryTerm Wireless Medium Access Control / fixed key establishment algorithm / sensor network applications / polynomial-based weak authentication protocols / gateway applications / ephemeral key agreement algorithm / real-time applications / message communications / fixed key agreement algorithm / software modules / ephemeral key establishment algorithm / secure and efficient solution / large wireless mesh networks / energy consumption / sensor networks / software implementation / mesh network / wireless ad hoc networks / radio chip / sensor applications / assignment algorithm / subset finding algorithm / experimental sensor network / less energy / subset cover finding algorithm / disjointed groups / wireless packets / software solutions / security protocols / sensor network / / OperatingSystem TinyOS / DoS / / Organization Peng Ning† Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh / Rice University / Department of Computer Science / Certificate Authority / Department of Homeland Security / Maughan‡ Science & Technology Directorate Department of Homeland Security / / Person Chris Karlof / David Wagner / Naveen Sastry / / Position manager / General / controller of the group / Imote2 Graphics Controller / Private / controller / / Product Self-Certified ECDH / Subset Difference Method / Merkle Hash Tree / Hardware Modules Imote2 / the hardware platform / Hardware Modules Imote2 / / ProgrammingLanguage Java / / ProvinceOrState California / Maryland / / Technology fixed key establishment algorithm / RAM / Subset-Cover algorithm / Fixed Key algorithm / key exchange protocol / 1.2 Self-Certified ECDH We implement Self-Certified ECDH protocol / low power PXA271 XScale processor / fixed key agreement algorithm / using Self-Certified ECDH protocol / key assignment algorithm / radio chip / SelfCertified ECDH protocol / Self-Certified ECDH protocol / private key / security protocols / secret key / Key algorithm / pdf / encryption / cryptography / CC2420 RF chip / public key / subset finding algorithm / Java / ephemeral key agreement algorithm / 2.1 Network Admission Control We use Self-Certified ECDH protocol / CTR mode encryption / subset cover finding algorithm / process control system / ephemeral key establishment algorithm / Ephemeral Key algorithm / polynomial-based weak authentication protocols / / URL http / SocialTag