메뉴 건너뛰기




Volumn 4, Issue , 2005, Pages 1909-1914

Securing sensor networks with location-based keys

Author keywords

[No Author keywords available]

Indexed keywords

NODES; SECURITY MECHANISM; SENSOR NETWORK;

EID: 24944483778     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2005.1424811     Document Type: Conference Paper
Times cited : (71)

References (23)
  • 1
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • Washington, DC. Nov.
    • L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in ACM CCS, Washington, DC. Nov. 2002.
    • (2002) ACM CCS
    • Eschenauer, L.1    Gligor, V.2
  • 3
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Washington. DC, Oct.
    • D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in ACM CCS, Washington. DC, Oct. 2003.
    • (2003) ACM CCS
    • Liu, D.1    Ning, P.2
  • 4
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key predistribution scheme for wireless sensor networks
    • Washington, DC, Oct.
    • W. Du, J. Deng, Y. Han, and P. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in ACM CCS, Washington, DC, Oct. 2003.
    • (2003) ACM CCS
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 5
    • 24944523654 scopus 로고    scopus 로고
    • Location-based pairwise key establishments for static sensor networks
    • Fairfax, VA, Oct.
    • D. Liu and P. Ning. "Location-based pairwise key establishments for static sensor networks," in ACM SASN, Fairfax, VA, Oct. 2003.
    • (2003) ACM SASN
    • Liu, D.1    Ning, P.2
  • 6
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • HongKong, China, March
    • W. Du, J. Deng, Y. Han, S. Chen, and P.K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," in IEEE INFOCOM, HongKong, China, March 2004.
    • (2004) IEEE INFOCOM
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4    Varshney, P.K.5
  • 7
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • June
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 8
    • 0037623983 scopus 로고    scopus 로고
    • Identify-based encryption from the weil pairing
    • D. Boneh and M. Franklin, "Identify-based encryption from the weil pairing," SIAM Journal of Computing, vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 9
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • ser. LNCS. Springer-Verlag
    • P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," in Proc. CRYPTO'02, ser. LNCS, vol. 2442. Springer-Verlag, 2002, pp. 354-368.
    • (2002) Proc. CRYPTO'02 , vol.2442 , pp. 354-368
    • Barreto, P.1    Kim, H.2    Bynn, B.3    Scott, M.4
  • 10
    • 24944445508 scopus 로고
    • Federal Information Processing Standards PUBlication 180-1, April
    • NIST, "Digital hash standard," Federal Information Processing Standards PUBlication 180-1, April 1995.
    • (1995) Digital Hash Standard
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 13
    • 84948990100 scopus 로고
    • The rc5 encryption algorithm
    • ser. LNCS. Springer-Verlag
    • R. Rivest, "The rc5 encryption algorithm," in Fast Software Encryption, ser. LNCS, vol. 1008. Springer-Verlag, 1995, pp. 86-96.
    • (1995) Fast Software Encryption , vol.1008 , pp. 86-96
    • Rivest, R.1
  • 14
    • 0034772133 scopus 로고    scopus 로고
    • Geography-informed energy conservation for ad hoc routing
    • Rome,Italy, July
    • Y. Xu, J. Heidemann, and D. Estrin, "Geography-informed energy conservation for ad hoc routing," in ACM MobiCom, Rome,Italy, July 2001.
    • (2001) ACM MobiCom
    • Xu, Y.1    Heidemann, J.2    Estrin, D.3
  • 15
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," AD Hoc Networks, vol. 1, no. 2, 2003.
    • (2003) AD Hoc Networks , vol.1 , Issue.2
    • Karlof, C.1    Wagner, D.2
  • 17
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • San Francisco, CA, April
    • Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in IEEE INFOCOM, San Francisco, CA, April 2003.
    • (2003) IEEE INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 18
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • ser. LNCS. Springer-Verlag
    • A. Shamir, "Identity based cryptosystems and signature schemes," in Proc. CRYPTO'84, ser. LNCS, vol. 196. Springer-Verlag, 1984, pp. 47-53.
    • (1984) Proc. CRYPTO'84 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 19
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
    • Santa Clara, CA. Oct.
    • D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography," in IEEE SECON, Santa Clara, CA. Oct. 2004.
    • (2004) IEEE SECON
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 20
    • 27244436587 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and rsa on 8-bit cpus
    • Boston, MA, Aug.
    • N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and rsa on 8-bit cpus," in CHES'04, Boston, MA, Aug. 2004.
    • (2004) CHES'04
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 21
    • 14844304757 scopus 로고    scopus 로고
    • Tinypk: Securing sensor networks with public key technology
    • Washington, DC, Oct.
    • R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, "Tinypk: Securing sensor networks with public key technology," in ACM SASN, Washington, DC, Oct. 2004.
    • (2004) ACM SASN
    • Watro, R.1    Kong, D.2    Fen Cuti, S.3    Gardiner, C.4    Lynn, C.5    Kruus, P.6
  • 22
    • 31844450265 scopus 로고    scopus 로고
    • Public keys cryptography in sensor networks - Revisited
    • EURESCOM, Heidelberg, Germany, Aug.
    • G. Gaubatz and B. S. J. Kaps, "Public keys cryptography in sensor networks - revisited," in ESAS'04, EURESCOM, Heidelberg, Germany, Aug. 2004.
    • (2004) ESAS'04
    • Gaubatz, G.1    Kaps, B.S.J.2
  • 23
    • 35048900981 scopus 로고    scopus 로고
    • On the selection of pairing-friendly groups
    • ser. LNCS. Springer-Verlag
    • P. Barreto, B. Lynn, and M. Scott, "On the selection of pairing-friendly groups," in Selected Areas in Cryptography - SAC '2003, ser. LNCS, vol. 3006. Springer-Verlag, 2004, pp. 17-25.
    • (2004) Selected Areas in Cryptography - SAC '2003 , vol.3006 , pp. 17-25
    • Barreto, P.1    Lynn, B.2    Scott, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.