We look at LZWW05 in more detail and suggest a variant to overcome a certain shortcoming. In particular, in case of communication failure or adversarial disruption, this protocol is not equipped with a practical resynchronization process and can fail to resume. We propose a variant of this protocol which is equipped with a resynchronization technique that allows users to resynchronize whenever they wish or when they suspect an intrusion.
Category / Keywords: cryptographic protocols / authentication, recognition, ad hoc networks, sensor networks Date: received 27 May 2008, last revised 27 May 2008 Contact author: amashata at uwaterloo ca Available formats: PDF | BibTeX Citation Version: 20080602:220019 (All versions of this report) Discussion forum: Show discussion | Start new discussion