Link-layer security in TSCH networks: effect on slot duration

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Link Layer Security Scheme for Wireless Sensor Networks ?

In this paper, we explore security issues of wireless sensor networks, and in particular propose an efficient link layer security scheme. The scheme provides transparent security services such as encryption, decryption and authentication at the link layer of the network protocol stack. To minimize computation and communication overheads of the scheme, we design a lightweight CBC-X mode Encrypti...

متن کامل

Link-Layer Cooperative Communication in Vehicular Networks

Vehicular ad hoc networks (VANETs) are a special kind of communication networks and possess unique characteristics as compared with general mobile ad hoc networks (MANETs), where vehicles communicate with each other or with stationary road side units. Hence, directly applying the existing communication protocols designed for MANETs may not be reliable and efficient in VANETs. Thus, this thesis ...

متن کامل

Adaptive synchronization in multi-hop TSCH networks

Time Slotted Channel Hopping (TSCH) enables highly reliable and ultra-low power wireless networking, and is at the heart of multiple industrial standards. It has become the de facto standard for industrial low-power wireless solutions, and a true enabler for the Industrial Internet of Things. In a TSCH network, all nodes remain tightly synchronized by periodically communicating with one another...

متن کامل

Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks

Ensuring communications security in Wireless Sensor Networks (WSNs) is very vital because the security protocols therein, should be devised to work at the link layer. Theoretically, any link layer security protocol must support three vital security attributes viz. Confidentiality, Message Integrity and Replay protection. However, in order to ensure lesser overhead, replay protection is often no...

متن کامل

Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks

Due to the severe resource constraints in the Wireless Sensor Networks (WSNs), the security protocols therein, should be designed to optimize the performance maximally. On the other hand a block cipher and the mode of operation in which it operates, play a vital role in determining the overall efficiency of a security protocol. In addition, when an application demands confidentiality and messag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Transactions on Emerging Telecommunications Technologies

سال: 2016

ISSN: 2161-3915

DOI: 10.1002/ett.3089