A practical secure neighbor verification protocol for wireless sensor networks.
Reza ShokriMarcin PoturalskiGael RavotPanos PapadimitratosJean-Pierre HubauxPublished in: WISEC (2009)
Keyphrases
- cryptographic protocols
- wireless sensor networks
- secure routing
- key establishment
- key management
- lightweight
- key distribution
- covert channel
- authentication protocol
- biological inspired
- security protocols
- energy efficient
- scalar product
- key management scheme
- sensor networks
- security properties
- security analysis
- resource constrained
- provably secure
- key exchange protocol
- multi party
- data dissemination
- residual energy
- key agreement
- energy efficiency
- sensor nodes
- mutual authentication
- node selection
- mac protocol
- formal verification
- standard model
- routing protocol
- model checking
- formal analysis
- public key
- formal methods
- password authentication
- secure multi party
- peer to peer
- protocol specification
- vertically partitioned data
- ad hoc networks
- data transmission
- model checker
- secret key
- multi hop
- mobile nodes
- key agreement protocol
- data aggregation
- diffie hellman
- rfid systems