...Networks
We gratefully acknowledge funding support for this research. This research was sponsored in part the United States Postal Service (contract USPS 102592-01-Z-0236), by the United States Defense Advanced Research Projects Agency (contracts DABT63-98-C-0038, ``Ninja'', N66001-99-2-8913, ``Endeavour'', and DABT63-96-C-0056, ``IRAM''), by the United States National Science Foundation (grants FD99-79852 and RI EIA-9802069) and from gifts and grants from the California MICRO program, Intel Corporation, IBM, Sun Microsystems, and Philips Electronics. DARPA Contract N66001-99-2-8913 is under the supervision of the Space and Naval Warfare Systems Center, San Diego. This paper represents the opinions of the authors and do not necessarily represent the opinions or policies, either expressed or implied, of the United States government, of DARPA, NSF, USPS, or any other of its agencies, or any of the other funding sponsors.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...keys.)
Note that base stations differ from nodes in having longer-lived energy supplies and having additional communications connections to outside networks.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...message.
In case the MAC does not match, the receiver can try out a fixed, small number of counter increments to recover from message loss. In case the optimistic re-synchronization fails, the two parties engage in a counter exchange protocol, which uses the strong freshness protocol described below.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...size.
The same property can also be achieved with a block cipher and the ``ciphertext-stealing'' method described by Schneier [38]. The downside is that this approach requires both encryption and decryption functions.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...message.
Key setup operations are dependent on the minimal and maximal disclosure interval, whereas the number of MAC operations depends on the number of buffered messages.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...epoch 
Epoch means the interval of a routing updates.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...updates 
However, the node here will need to have significantly more memory resource than the sensor nodes we explored here in order to store the key chain.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

Adrian Perrig
Fri Jun 1 22:51:44 PDT 2001