Security in Sensor Networks. By: Tracy Barger, David Friedman, and Stavan Parikh. MEMS – Microelctromechanical Systems. Swarms ??. Group Behavior Bees ! MEMS (Smart Dust). Applications Surveillance Smart House Grocery Shopping FedEx tracking on Steroids. Environment Constraints.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
By: Tracy Barger, David Friedman, and Stavan Parikh
Note: If security is a priority, keys can be refreshed using a group key distribution scheme such as key graphs
Calculates key Chain:
H(Xn) = X n-1… H(X1)= X0
M = E(Command || Xi)
Mote decrypts M,
Checks H(Xi) = Xi-1
Then stores Xi in place of Xi-1