The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Citations
3,747 citations
Cites background from "The Resurrecting Duckling: Security..."
...[23] F. Stajano and R. Anderson....
[...]
...Stajano and Anderson [23] elucidate some of the security is- sues facing ad hoc networks and investigate ad hoc networks composed of low compute-power nodes such as home ap-pliances, sensor networks, and PDAs where full public key cryptography may not be feasible....
[...]
...Stajano and Anderson [23] elucidate some of the security issues facing ad hoc networks and investigate ad hoc networks composed of low compute-power nodes such as home appliances, sensor networks, and PDAs where full public key cryptography may not be feasible....
[...]
3,125 citations
Cites background from "The Resurrecting Duckling: Security..."
...Stajano and Anderson discuss the issues of bootstrapping security devices [22]....
[...]
2,946 citations
Cites background from "The Resurrecting Duckling: Security..."
...Security issues in ad-hoc networks are similar to those in sensor networks and have been well enumerated in the literature [9, 10], but the defense mechanisms developed for ad-hoc networks are not directly applicable to sensor networks....
[...]
2,703 citations
Cites background from "The Resurrecting Duckling: Security..."
...Stajano and Anderson discuss the issues of bootstrapping security devices [51]....
[...]
2,298 citations
Cites background from "The Resurrecting Duckling: Security..."
...Stajano and Anderson discuss the issues of bootstrapping security devices [39]....
[...]
References
14,980 citations
"The Resurrecting Duckling: Security..." refers background in this paper
...Suppose that a doctor picks up a thermometer and tries to get his palmtop to do a Diffie-Hellman key exchange [6] with it over the air....
[...]
1,185 citations
1,133 citations
"The Resurrecting Duckling: Security..." refers background in this paper
...This can in theory be avoided by making the node tamper-proof, but it is much easier to talk about this property than to implement it in practice [1], especially within the cost and form factor constraints of personal consumer electronics devices....
[...]
708 citations
"The Resurrecting Duckling: Security..." refers background in this paper
...In this case, one must still design the device so that non-intrusive attacks (such as those based on protocol failure, power analysis and glitch attacks [2]) are not practical; it is also necessary to take into account the time that might pass before a broken seal is noticed, and the likelihood of successful attacks on the sealing mechanism [9]....
[...]
401 citations