File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Authenticated Directed Diffusion

TitleAuthenticated Directed Diffusion
Authors
KeywordsDirected Diffusion
Authentication
Wireless Sensor Networks
Issue Date2008
PublisherSpringer.
Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
The 7th International Conference on Cryptology and Network Security (CANS 2008), Hong-Kong, China, 2-4 December 2008. In Lecture Notes in Computer Science, 2008, v. 5339, p. 366-377 How to Cite?
AbstractDirected Diffusion(DD) is a method of data dissemination especially suitable in distributed sensing scenarios. It has been known well in the application of wireless sensor network routing. Although it is very popular as a data-centric routing protocol for wireless sensor network(WSN), it faces several types of serious attacks. We proposes a new protocol (”Authenticated Directed Diffusion” (ADD)) which extends the directed diffusion protocol. According to the resource constraint of WSN, we adopt a real time one-way key chain and authenticated blacklist diffusion to achieve the authenticity and integrity in the routing process for directed diffusion with relative low overhead. Authenticated Directed Diffusion mainly tackle three problems(DoS attack,sinkhole attack and bogus routing attack) which Directed Diffusion can not handle. The simulation result shows that the performance of Authenticated Directed Diffusion is acceptable. © 2008 Springer Berlin Heidelberg.
DescriptionLNCS v. 5339 entitled: Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings
Persistent Identifierhttp://hdl.handle.net/10722/61206
ISBN
ISSN
2005 Impact Factor: 0.402
2015 SCImago Journal Rankings: 0.252
References

 

DC FieldValueLanguage
dc.contributor.authorWang, Ken_HK
dc.contributor.authorHui, CKen_HK
dc.contributor.authorYiu, SMen_HK
dc.date.accessioned2010-07-13T03:33:09Z-
dc.date.available2010-07-13T03:33:09Z-
dc.date.issued2008en_HK
dc.identifier.citationThe 7th International Conference on Cryptology and Network Security (CANS 2008), Hong-Kong, China, 2-4 December 2008. In Lecture Notes in Computer Science, 2008, v. 5339, p. 366-377-
dc.identifier.isbn978-3-540-89640-1en_HK
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/61206-
dc.descriptionLNCS v. 5339 entitled: Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings-
dc.description.abstractDirected Diffusion(DD) is a method of data dissemination especially suitable in distributed sensing scenarios. It has been known well in the application of wireless sensor network routing. Although it is very popular as a data-centric routing protocol for wireless sensor network(WSN), it faces several types of serious attacks. We proposes a new protocol (”Authenticated Directed Diffusion” (ADD)) which extends the directed diffusion protocol. According to the resource constraint of WSN, we adopt a real time one-way key chain and authenticated blacklist diffusion to achieve the authenticity and integrity in the routing process for directed diffusion with relative low overhead. Authenticated Directed Diffusion mainly tackle three problems(DoS attack,sinkhole attack and bogus routing attack) which Directed Diffusion can not handle. The simulation result shows that the performance of Authenticated Directed Diffusion is acceptable. © 2008 Springer Berlin Heidelberg.-
dc.languageengen_HK
dc.publisherSpringer.en_HK
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/-
dc.relation.ispartofLecture Notes in Computer Science-
dc.subjectDirected Diffusion-
dc.subjectAuthentication-
dc.subjectWireless Sensor Networks-
dc.titleAuthenticated Directed Diffusionen_HK
dc.typeConference_Paperen_HK
dc.identifier.openurlhttp://library.hku.hk:4550/resserv?sid=HKU:IR&issn=978-3-540-89640-1&volume=&spage=&epage=&date=2008&atitle=Authenticated+Directed+Diffusionen_HK
dc.identifier.emailHui, CK: hui@cs.hku.hken_HK
dc.identifier.emailYiu, SM: smyiu@cs.hku.hken_HK
dc.identifier.authorityHui, CK=rp00120en_HK
dc.identifier.authorityYiu, SM=rp00207en_HK
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-58449112441-
dc.identifier.hkuros167079en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-58449112441&selection=ref&src=s&origin=recordpage-
dc.identifier.volume5339-
dc.identifier.spage366-
dc.identifier.epage377-
dc.publisher.placeGermany-
dc.identifier.scopusauthoridWang, EK=55236270600-
dc.identifier.scopusauthoridHui, LCK=8905728300-
dc.identifier.scopusauthoridYiu, SM=7003282240-
dc.customcontrol.immutablesml 111516 - merged-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats