- ...Networks
- We gratefully
acknowledge funding support for this research. This research
was sponsored in part the United States Postal Service (contract USPS
102592-01-Z-0236), by the United States Defense
Advanced Research Projects Agency (contracts DABT63-98-C-0038, ``Ninja'',
N66001-99-2-8913, ``Endeavour'', and DABT63-96-C-0056, ``IRAM''), by the United States National
Science Foundation (grants FD99-79852 and RI EIA-9802069) and from gifts and grants from the
California MICRO program, Intel Corporation, IBM, Sun Microsystems, and
Philips Electronics.
DARPA Contract N66001-99-2-8913 is under the
supervision of the Space and Naval Warfare Systems Center, San Diego.
This paper represents the opinions of the authors and
do not necessarily represent the opinions or policies, either expressed or
implied, of the United States government, of DARPA, NSF, USPS, or any other
of its agencies, or any of the other funding sponsors.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...keys.)
- Note that base
stations differ from nodes in having longer-lived energy supplies and having
additional communications connections to outside networks.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...message.
- In case the MAC
does not match, the receiver can try out a fixed, small number of counter
increments to recover from message loss. In case the optimistic
re-synchronization fails, the two parties engage in a counter exchange
protocol, which uses the strong freshness protocol described below.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...size.
- The same property can also be achieved with a block cipher and
the ``ciphertext-stealing'' method described by Schneier [38]. The
downside is that this approach requires both encryption and decryption
functions.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...message.
- Key setup
operations are dependent on the minimal and maximal disclosure interval,
whereas the number of MAC operations depends on the number of buffered
messages.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...epoch
- Epoch means the interval of a
routing updates.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...updates
- However, the node here will need to have
significantly more memory resource than the sensor nodes
we explored here in order to store the key chain.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.