Back to Results
First PageMeta Content
Wireless sensor network / Computer programming / Technology / Merkle signature scheme / Kademlia / Distributed data storage / Computing / Binary tree


Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q
Add to Reading List

Document Date: 2011-11-09 13:26:15


Open Document

File Size: 215,26 KB

Share Result on Facebook

Company

Needham / A1 K AB / A3 K AB / A2 K AB / Ki / Peng Ning Cyber Defense Laboratory / /

/

Event

FDA Phase / /

Facility

Computer Science Department North Carolina State University / /

IndustryTerm

ad-hoc wireless networks / overall network / sensor networks / battery-operated sensor devices / ad hoc wireless networks / large network / setup server / important technology / economical solution / distributed sensor networks / interactive node-to-node authentication protocol / Wireless Networks Journal / wireless sensor networks / jth key chain / distributed systems / wireless communication / wireless communication links / sensor network / /

Organization

Army Research Office / North Carolina State University / Raleigh / National Science Foundation / /

Person

R. Szewczyk / V / K BA / Sybil Attacks / Overhead Storage (Bytes) / /

Product

Franklin / K4 / /

PublishedMedium

Communications of the ACM / /

Technology

encryption / cryptography / public key / peer-to-peer / Sensor Network Protocols / Security protocols / secret key / simulation / interactive node-to-node authentication protocol / using symmetric key cryptography to defeat Sybil attacks / /

SocialTag