Optimally-balanced Hash Tree Generation in Ad Hoc Networks
Main Article Content
Abstract
Article Details
Issue
Section
References
R. C. Merkle, "Protocols for Public Key Cryptosystems," in Proc. IEEE Symposium on Research in Security and Privacy, 1980.
W. Du, R. Wang, and P. Ning, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks," ACM, MobiHoc, 2005. L. Zhou and C. V. Ravishankar, "Dynamic Merkel Trees for verifying privileges in Sensor Networks," in Proc. IEEE ICC 2006.
M. Jakobsson and S. Wetzel, "Efficient Attribute Authentication with Applications to Ad hoc Networks," ACM, VANET, 2004.
V. Kondratieva and S-W Seo, "Optimized Hash Tree for Authentication in Sensor Networks," IEEE Communications Letters, Vol. 11, No. 2, Feb. 2007.
ns-2 : Network Simulator, available at http://www.isi.edu/nsnam
OpenSSL : Standard Cryptographic Library, available at http://www.openssl.org