SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Timing-sync protocol for sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Hi-index | 0.00 |
Mobile Ad hoc networks are networks composed of mobile computing devices with wireless connections and no fixed infrastructure. The unique attributes of these networks cause new security problems. Some security protocols, such as the Timed, Ef£cient, Streaming, Loss-tolerant Authentication Protocol, TESLA [2], rely on loose time synchronization for security. These protocols have not fully analyzed the implications of relying on time synchronization in this environment. This paper looks into some of the difficulties in time synchronization and points out further areas for research.