Low cost security for sensor networks. Atsan, E., Safaka, I., Keller, L., & Fragouli, C. In Proceedings of the 2013 IEEE International Symposium on Network Coding (NetCod), 2013. event-place: Calgary, Canadaabstract bibtex We design and evaluate a lightweight encryption protocol suitable for sensor networks, that enables weak security in the presence of passive eavesdroppers. At every communication round, our protocol creates a key between each sensor node and the sink, by appropriately mixing and coding information packets that the nodes passively overhear. Evaluation using the TOSSIM simulator indicates that with our protocol we can gain significant security benefits at low overhead cost.
@inproceedings{atsan_low_2013,
abstract = {We design and evaluate a lightweight encryption protocol suitable for sensor networks, that enables weak security in the presence of passive eavesdroppers. At every communication round, our protocol creates a key between each sensor node and the sink, by appropriately mixing and coding information packets that the nodes passively overhear. Evaluation using the TOSSIM simulator indicates that with our protocol we can gain significant security benefits at low overhead cost.},
type={4},
author = {Atsan, Emre and Safaka, I. and Keller, L. and Fragouli, C.},
booktitle = {Proceedings of the 2013 {IEEE} {International} {Symposium} on {Network} {Coding} ({NetCod})},
keywords = {information-theoretic security, Sensor networks, Week security},
note = {event-place: Calgary, Canada},
tags = {security,sensor_networks},
title = {Low cost security for sensor networks},
year = {2013}
}
Downloads: 0
{"_id":"7FQDSn6JyfqhdXYQa","bibbaseid":"atsan-safaka-keller-fragouli-lowcostsecurityforsensornetworks-2013","author_short":["Atsan, E.","Safaka, I.","Keller, L.","Fragouli, C."],"bibdata":{"bibtype":"inproceedings","type":"4","abstract":"We design and evaluate a lightweight encryption protocol suitable for sensor networks, that enables weak security in the presence of passive eavesdroppers. At every communication round, our protocol creates a key between each sensor node and the sink, by appropriately mixing and coding information packets that the nodes passively overhear. Evaluation using the TOSSIM simulator indicates that with our protocol we can gain significant security benefits at low overhead cost.","author":[{"propositions":[],"lastnames":["Atsan"],"firstnames":["Emre"],"suffixes":[]},{"propositions":[],"lastnames":["Safaka"],"firstnames":["I."],"suffixes":[]},{"propositions":[],"lastnames":["Keller"],"firstnames":["L."],"suffixes":[]},{"propositions":[],"lastnames":["Fragouli"],"firstnames":["C."],"suffixes":[]}],"booktitle":"Proceedings of the 2013 IEEE International Symposium on Network Coding (NetCod)","keywords":"information-theoretic security, Sensor networks, Week security","note":"event-place: Calgary, Canada","tags":"security,sensor_networks","title":"Low cost security for sensor networks","year":"2013","bibtex":"@inproceedings{atsan_low_2013,\n abstract = {We design and evaluate a lightweight encryption protocol suitable for sensor networks, that enables weak security in the presence of passive eavesdroppers. At every communication round, our protocol creates a key between each sensor node and the sink, by appropriately mixing and coding information packets that the nodes passively overhear. Evaluation using the TOSSIM simulator indicates that with our protocol we can gain significant security benefits at low overhead cost.},\n type={4},\n author = {Atsan, Emre and Safaka, I. and Keller, L. and Fragouli, C.},\n booktitle = {Proceedings of the 2013 {IEEE} {International} {Symposium} on {Network} {Coding} ({NetCod})},\n keywords = {information-theoretic security, Sensor networks, Week security},\n note = {event-place: Calgary, Canada},\n tags = {security,sensor_networks},\n title = {Low cost security for sensor networks},\n year = {2013}\n}\n\n","author_short":["Atsan, E.","Safaka, I.","Keller, L.","Fragouli, C."],"key":"atsan_low_2013","id":"atsan_low_2013","bibbaseid":"atsan-safaka-keller-fragouli-lowcostsecurityforsensornetworks-2013","role":"author","urls":{},"keyword":["information-theoretic security","Sensor networks","Week security"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/52xaJNXvSgauGDmZR","dataSources":["ZyBHKCcCyS7Qk9n3w","2BHqTGHtDg7BjRAJQ","XpqzCLvCgsYBqbTpK","QNNZyNQzfeETJyTbL","Z6bBhKezwKd3pPWRc"],"keywords":["information-theoretic security","sensor networks","week security"],"search_terms":["low","cost","security","sensor","networks","atsan","safaka","keller","fragouli"],"title":"Low cost security for sensor networks","year":2013}