Link-layer security in TSCH networks: effect on slot duration
نویسندگان
چکیده
منابع مشابه
Efficient Link Layer Security Scheme for Wireless Sensor Networks ?
In this paper, we explore security issues of wireless sensor networks, and in particular propose an efficient link layer security scheme. The scheme provides transparent security services such as encryption, decryption and authentication at the link layer of the network protocol stack. To minimize computation and communication overheads of the scheme, we design a lightweight CBC-X mode Encrypti...
متن کاملLink-Layer Cooperative Communication in Vehicular Networks
Vehicular ad hoc networks (VANETs) are a special kind of communication networks and possess unique characteristics as compared with general mobile ad hoc networks (MANETs), where vehicles communicate with each other or with stationary road side units. Hence, directly applying the existing communication protocols designed for MANETs may not be reliable and efficient in VANETs. Thus, this thesis ...
متن کاملAdaptive synchronization in multi-hop TSCH networks
Time Slotted Channel Hopping (TSCH) enables highly reliable and ultra-low power wireless networking, and is at the heart of multiple industrial standards. It has become the de facto standard for industrial low-power wireless solutions, and a true enabler for the Industrial Internet of Things. In a TSCH network, all nodes remain tightly synchronized by periodically communicating with one another...
متن کاملOptimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks
Ensuring communications security in Wireless Sensor Networks (WSNs) is very vital because the security protocols therein, should be devised to work at the link layer. Theoretically, any link layer security protocol must support three vital security attributes viz. Confidentiality, Message Integrity and Replay protection. However, in order to ensure lesser overhead, replay protection is often no...
متن کاملEvaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks
Due to the severe resource constraints in the Wireless Sensor Networks (WSNs), the security protocols therein, should be designed to optimize the performance maximally. On the other hand a block cipher and the mode of operation in which it operates, play a vital role in determining the overall efficiency of a security protocol. In addition, when an application demands confidentiality and messag...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transactions on Emerging Telecommunications Technologies
سال: 2016
ISSN: 2161-3915
DOI: 10.1002/ett.3089