Optimally-balanced Hash Tree Generation in Ad Hoc Networks
Abstract
Keywords
Full Text:
PDFReferences
R. C. Merkle, "Protocols for Public Key Cryptosystems," in Proc. IEEE Symposium on Research in Security and Privacy, 1980.
W. Du, R. Wang, and P. Ning, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks," ACM, MobiHoc, 2005. L. Zhou and C. V. Ravishankar, "Dynamic Merkel Trees for verifying privileges in Sensor Networks," in Proc. IEEE ICC 2006.
M. Jakobsson and S. Wetzel, "Efficient Attribute Authentication with Applications to Ad hoc Networks," ACM, VANET, 2004.
V. Kondratieva and S-W Seo, "Optimized Hash Tree for Authentication in Sensor Networks," IEEE Communications Letters, Vol. 11, No. 2, Feb. 2007.
ns-2 : Network Simulator, available at http://www.isi.edu/nsnam
OpenSSL : Standard Cryptographic Library, available at http://www.openssl.org
DOI: http://dx.doi.org/10.5130/ajict.v6i1.815