Detail publikace

Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors

Originální název

Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors

Anglický název

Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors

Jazyk

en

Originální abstrakt

We proposed modification of Collection Tree Protocol suitable for wireless sensors with tamper resistant module. This platform provides better security, however ordinary protocols cannot utilize its features. Our goal was to offer secure routing protocol with similar behavior and efficiency to the original protocol. Both protocols were simulated to prove that adding security to protocols does not necessarily lead to higher demands to data transfer and thus power consumption.

Anglický abstrakt

We proposed modification of Collection Tree Protocol suitable for wireless sensors with tamper resistant module. This platform provides better security, however ordinary protocols cannot utilize its features. Our goal was to offer secure routing protocol with similar behavior and efficiency to the original protocol. Both protocols were simulated to prove that adding security to protocols does not necessarily lead to higher demands to data transfer and thus power consumption.

BibTex


@inproceedings{BUT30858,
  author="Peter {Pecho} and Jan {Nagy} and Petr {Hanáček} and Martin {Drahanský}",
  title="Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors",
  annote="We proposed modification of Collection Tree Protocol suitable for wireless
sensors with tamper resistant module. This platform provides better security,
however ordinary protocols cannot utilize its features. Our goal was to offer
secure routing protocol with similar behavior and efficiency to the original
protocol. Both protocols were simulated to prove that adding security to
protocols does not necessarily lead to higher demands to data transfer and thus
power consumption.",
  address="Springer Verlag",
  booktitle="Proceedings of International Conference SecTech 2009",
  chapter="30858",
  doi="10.1007/978-3-642-10847-1_27",
  edition="Communications in Computer and Information Science 58",
  howpublished="print",
  institution="Springer Verlag",
  year="2009",
  month="december",
  pages="217--224",
  publisher="Springer Verlag",
  type="conference paper"
}