Show simple item record

dc.contributor.convenorRod Tuckeren_AU
dc.contributor.authorSingh, Kalvinderen_US
dc.contributor.authorBhatt, Kartikeyen_US
dc.contributor.authorMuthukkumarasamy, Vallipuramen_US
dc.contributor.editorRod Tuckeren_US
dc.date.accessioned2017-05-03T13:58:35Z
dc.date.available2017-05-03T13:58:35Z
dc.date.issued2006en_US
dc.date.modified2007-08-02T21:46:47Z
dc.identifier.refurihttp://www.atnac2006.com/en_AU
dc.identifier.urihttp://hdl.handle.net/10072/11507
dc.description.abstractWireless sensor networks provide solutions to a range of monitoring problems. However, they also introduce a new set of problems mainly due to small memories, weak processors, limited energy and small packet size. Thus only a very few conventional protocols can readily be used in sensor networks. This paper introduces efficient protocols to distribute keys in wireless sensor networks. We also show how to harden the protocol against brute force attacks on small security keys. This is achieved without the necessity of using traditional encryption. The proposed protocols guarantee that the new key is fresh and that the communicating nodes use the same key. The protocols were implemented in TinyOS and simulated using TOSSIM. Energy consumption and memory requirements are analysed in detail.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.format.extent77800 bytes
dc.format.extent22133 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypetext/plain
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherThe University of Melbourneen_US
dc.publisher.placeMelbourneen_US
dc.publisher.urihttp://www.atnac2006.com/en_AU
dc.relation.ispartofstudentpublicationNen_AU
dc.relation.ispartofconferencenameAustralian Telecommunication Networks and Applications Conference 2006en_US
dc.relation.ispartofconferencetitleProceedings of the Australian Telecommunication Networks and Applications Conference 2006en_US
dc.relation.ispartofdatefrom2006-12-04en_US
dc.relation.ispartofdateto2006-12-06en_US
dc.relation.ispartoflocationMelbourneen_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchHISTORY AND ARCHAEOLOGYen_US
dc.subject.fieldofresearchcode289999en_US
dc.subject.fieldofresearchcode291799en_US
dc.subject.fieldofresearchcode210000en_US
dc.titleProtecting Small Keys in Authentication Protocols for Wireless Sensor Networksen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.facultyGriffith Sciences, School of Information and Communication Technologyen_US
gro.rights.copyrightCopyright University of Melbourne : The author-version of this article is available: Use hypertext link for access to the conference website.en_AU
gro.date.issued2006
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record