Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks
We present a comprehensive analysis on connectivity and resilience of secure sensor networks under the widely studied q-composite key predistribution scheme. For network connectivity, which ensures that any two sensors can find a path in between for secure communication, we derive the conditions to...
Saved in:
Main Author: | Zhao, Jun |
---|---|
Format: | Article |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/86913 http://hdl.handle.net/10220/44208 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Strongly leakage resilient authenticated key exchange, revisited
by: YANG, Guomin, et al.
Published: (2019) -
(Strong) multidesignated verifiers signatures secure against rogue key attack
by: ZHANG, Yunmei, et al.
Published: (2012) -
A Pollution Attack to Public-key Watermarking Schemes
by: WU, Yongdong, et al.
Published: (2012) -
Long term key management architecture for SCADA systems
by: SAPUTRA, Hendra, et al.
Published: (2018) -
Understanding and constructing AKE via double-key key encapsulation mechanism
by: XUE, Haiyang, et al.
Published: (2018)