File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Authenticated Directed Diffusion
Title | Authenticated Directed Diffusion |
---|---|
Authors | |
Keywords | Directed Diffusion Authentication Wireless Sensor Networks |
Issue Date | 2008 |
Publisher | Springer. Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | The 7th International Conference on Cryptology and Network Security (CANS 2008), Hong-Kong, China, 2-4 December 2008. In Lecture Notes in Computer Science, 2008, v. 5339, p. 366-377 How to Cite? |
Abstract | Directed Diffusion(DD) is a method of data dissemination especially suitable in distributed sensing scenarios. It has been known well in the application of wireless sensor network routing. Although it is very popular as a data-centric routing protocol for wireless sensor network(WSN), it faces several types of serious attacks. We proposes a new protocol (”Authenticated Directed Diffusion” (ADD)) which extends the directed diffusion protocol. According to the resource constraint of WSN, we adopt a real time one-way key chain and authenticated blacklist diffusion to achieve the authenticity and integrity in the routing process for directed diffusion with relative low overhead. Authenticated Directed Diffusion mainly tackle three problems(DoS attack,sinkhole attack and bogus routing attack) which Directed Diffusion can not handle. The simulation result shows that the performance of Authenticated Directed Diffusion is acceptable. © 2008 Springer Berlin Heidelberg. |
Description | LNCS v. 5339 entitled: Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings |
Persistent Identifier | http://hdl.handle.net/10722/61206 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, K | en_HK |
dc.contributor.author | Hui, CK | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.date.accessioned | 2010-07-13T03:33:09Z | - |
dc.date.available | 2010-07-13T03:33:09Z | - |
dc.date.issued | 2008 | en_HK |
dc.identifier.citation | The 7th International Conference on Cryptology and Network Security (CANS 2008), Hong-Kong, China, 2-4 December 2008. In Lecture Notes in Computer Science, 2008, v. 5339, p. 366-377 | - |
dc.identifier.isbn | 978-3-540-89640-1 | en_HK |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/61206 | - |
dc.description | LNCS v. 5339 entitled: Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings | - |
dc.description.abstract | Directed Diffusion(DD) is a method of data dissemination especially suitable in distributed sensing scenarios. It has been known well in the application of wireless sensor network routing. Although it is very popular as a data-centric routing protocol for wireless sensor network(WSN), it faces several types of serious attacks. We proposes a new protocol (”Authenticated Directed Diffusion” (ADD)) which extends the directed diffusion protocol. According to the resource constraint of WSN, we adopt a real time one-way key chain and authenticated blacklist diffusion to achieve the authenticity and integrity in the routing process for directed diffusion with relative low overhead. Authenticated Directed Diffusion mainly tackle three problems(DoS attack,sinkhole attack and bogus routing attack) which Directed Diffusion can not handle. The simulation result shows that the performance of Authenticated Directed Diffusion is acceptable. © 2008 Springer Berlin Heidelberg. | - |
dc.language | eng | en_HK |
dc.publisher | Springer. | en_HK |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | - |
dc.relation.ispartof | Lecture Notes in Computer Science | - |
dc.subject | Directed Diffusion | - |
dc.subject | Authentication | - |
dc.subject | Wireless Sensor Networks | - |
dc.title | Authenticated Directed Diffusion | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=978-3-540-89640-1&volume=&spage=&epage=&date=2008&atitle=Authenticated+Directed+Diffusion | en_HK |
dc.identifier.email | Hui, CK: hui@cs.hku.hk | en_HK |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | en_HK |
dc.identifier.authority | Hui, CK=rp00120 | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-58449112441 | - |
dc.identifier.hkuros | 167079 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-58449112441&selection=ref&src=s&origin=recordpage | - |
dc.identifier.volume | 5339 | - |
dc.identifier.spage | 366 | - |
dc.identifier.epage | 377 | - |
dc.publisher.place | Germany | - |
dc.identifier.scopusauthorid | Wang, EK=55236270600 | - |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | - |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | - |
dc.customcontrol.immutable | sml 111516 - merged | - |
dc.identifier.issnl | 0302-9743 | - |