메뉴 건너뛰기




Volumn 2005, Issue 4, 2005, Pages 579-589

Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis

Author keywords

Key management schemes; Security; Sensor networks

Indexed keywords

AD HOC NETWORKS; SENSOR NETWORKS;

EID: 28444488609     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1155/WCN.2005.579     Document Type: Article
Times cited : (30)

References (24)
  • 1
    • 10644222494 scopus 로고    scopus 로고
    • M.S. Thesis, Linköping University, Linköping, Sweden
    • K. Fokine, "Key management in ad hoc networks," M.S. Thesis, Linköping University, Linköping, Sweden, 2002.
    • (2002) Key Management in Ad Hoc Networks
    • Fokine, K.1
  • 2
    • 0008144151 scopus 로고    scopus 로고
    • Ubiquitous and robust authentication services for ad hoc wireless networks
    • Department of Computer Science, University of California, Los Angeles, Los Angeles, Calif, USA
    • H. Luo and S. Lu, "Ubiquitous and robust authentication services for ad hoc wireless networks," Tech. Rep. TR-200030, Department of Computer Science, University of California, Los Angeles, Los Angeles, Calif, USA, 2000.
    • (2000) Tech. Rep. , vol.TR-200030
    • Luo, H.1    Lu, S.2
  • 6
    • 0003237987 scopus 로고
    • The Kerberos network authentication service (version 5)
    • J. Kohl and B. Neuman, "The Kerberos network authentication service (version 5)," RFC-1510,1993.
    • (1993) RFC-1510
    • Kohl, J.1    Neuman, B.2
  • 8
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and CRL profile
    • R. Housley, W. Ford, W. Polk, and D. Solo, "Internet X.509 public key infrastructure certificate and CRL profile," RFC 2459, 1999.
    • (1999) RFC , vol.2459
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 15
    • 0038425881 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, "Robust and efficient sharing of RSA functions," Journal of Cryptology, vol. 13, no. 2, pp. 273-300, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.2 , pp. 273-300
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 16
    • 4944253148 scopus 로고    scopus 로고
    • Maintaining authenticated communication in the presence of break-ins
    • R. Canetti, S. Halevi, and A. Herzberg, "Maintaining authenticated communication in the presence of break-ins," Journal of Cryptology, vol. 13, no. 1, pp. 61-105, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 61-105
    • Canetti, R.1    Halevi, S.2    Herzberg, A.3
  • 17
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures (Extended Abstract)
    • Santa Barbara, Calif, USA
    • Y. Desmedt and Y. Frankel, "Shared generation of authenticators and signatures (Extended Abstract)," in 11th Annual International Cryptology Conference (CRYPTO '91), pp. 457-469, Santa Barbara, Calif, USA, 1991.
    • (1991) 11th Annual International Cryptology Conference (CRYPTO '91) , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 18
    • 0008095081 scopus 로고
    • Parallel reliable threshold multi-signature
    • Department of EECS, University of Wisconsin-Milwaukee, Milwaukee, Wis, USA
    • Y. Frankel and Y. G. Desmedt, "Parallel reliable threshold multi-signature," Tech. Rep. TR-92-04-02, Department of EECS, University of Wisconsin-Milwaukee, Milwaukee, Wis, USA, 1992.
    • (1992) Tech. Rep. , vol.TR-92-04-02
    • Frankel, Y.1    Desmedt, Y.G.2
  • 19
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • L. Gong, "Increasing availability and security of an authentication service," IEEE J. Select. Areas Commun., vol. 11, no. 6, pp. 657-662, 1993.
    • (1993) IEEE J. Select. Areas Commun. , vol.11 , Issue.6 , pp. 657-662
    • Gong, L.1
  • 20
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 21
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Networks, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) IEEE Networks , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 22
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • Proc. 15th Annual International Cryptology Conference (CRYPTO '95), Santa Barbara, Calif, USA, August
    • A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive secret sharing or: How to cope with perpetual leakage," in Proc. 15th Annual International Cryptology Conference (CRYPTO '95), vol. 963 of Lecture Notes In Computer Science, pp. 339-352, Santa Barbara, Calif, USA, August 1995.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 23
    • 0033314753 scopus 로고    scopus 로고
    • An overview ofPKI trust models
    • R. Perlman, "An overview ofPKI trust models," IEEE Network, vol. 13, no. 6, pp. 38-43, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 38-43
    • Perlman, R.1
  • 24
    • 3042699726 scopus 로고    scopus 로고
    • Empirical analysis of the mobility factor for the random waypoint model
    • Washington, DC, USA, August
    • J. Song and L. E. Miller, "Empirical analysis of the mobility factor for the random waypoint model," in Proc. OPNETWORK, Washington, DC, USA, August 2002.
    • (2002) Proc. OPNETWORK
    • Song, J.1    Miller, L.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.