• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

PIKE: Peer intermediaries for key establishment in sensor networks (2005)

Cached

  • Download as a PDF

Download Links

  • [sparrow.ece.cmu.edu]
  • [sparrow.ece.cmu.edu]
  • [128.2.134.25]
  • [sparrow.ece.cmu.edu]
  • [www.ece.cmu.edu]
  • [www-2.cs.cmu.edu]
  • [www.tcs.hut.fi]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [www.cs.uiuc.edu]
  • [www.ece.cmu.edu]
  • [www.distcomp.ethz.ch]
  • [disco.ethz.ch]
  • [dcg.ethz.ch]
  • [distcomp.ethz.ch]
  • [www.dcg.ethz.ch]
  • [users.ece.cmu.edu]
  • [nas.uhcl.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [sce.uhcl.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Haowen Chan
Venue:In Proceedings of IEEE Infocom
Citations:141 - 2 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Chan05pike:peer,
    author = {Haowen Chan},
    title = {PIKE: Peer intermediaries for key establishment in sensor networks},
    booktitle = {In Proceedings of IEEE Infocom},
    year = {2005},
    pages = {524--535}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Abstract — The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key cryptography for these resource-constrained platforms. A range of symmetric-key distribution protocols exist, but these protocols do not scale effectively to large sensor networks. For a given level of security, each protocol incurs a linearly increasing overhead in either communication cost per node or memory per node. We describe Peer Intermediaries for Key Establishment (PIKE), a class of key-establishment protocols that involves using one or more sensor nodes as a trusted intermediary to facilitate key establishment. We show that, unlike existing key-establishment protocols, both the communication and memory overheads of PIKE protocols scale sub-linearly (O ( √ n)) with the number of nodes in the network yet achieving higher security against node compromise than other protocols. I.

Keyphrases

key establishment    sensor network    peer intermediary    key-establishment protocol    challenging problem    memory overhead    resource-constrained platform    sensor node    pike protocol    node compromise    asymmetric key cryptography    communication cost    neighbor node    cryptographic key    large sensor network    symmetric-key distribution protocol    trusted intermediary   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University