메뉴 건너뛰기




Volumn , Issue , 2003, Pages 42-51

A pairwise key pre-distribution scheme for wireless sensor networks

Author keywords

Key pre distribution; Security; Wireless sensor networks

Indexed keywords

ALGORITHMS; COMPUTER CRIME; CRYPTOGRAPHY; PROBABILITY DISTRIBUTIONS; SECURITY SYSTEMS; SENSORS;

EID: 3042783638     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/948117.948118     Document Type: Conference Paper
Times cited : (926)

References (18)
  • 1
    • 18744397051 scopus 로고    scopus 로고
    • Wireless Integrated Network Sensors, University of California, Available: http://www.janet.ucla.edu/WINS.
  • 4
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • (Thomas Beth, Norbert Cot, and Ingemar Ingemarsson, eds.), Lecture Notes in Computer Science, Springer-Verlag
    • R. Blom. An optimal class of symmetric key generation systems. Advances in Cryptology: Proceedings of EUROCRYPT 84 (Thomas Beth, Norbert Cot, and Ingemar Ingemarsson, eds.), Lecture Notes in Computer Science, Springer-Verlag, 209:335-338, 1985.
    • (1985) Advances in Cryptology: Proceedings of EUROCRYPT 84 , vol.209 , pp. 335-338
    • Blom, R.1
  • 6
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, available at http://download.nai.com/products/media/nai/zip/nailabs-report-00- 010-final.zip, 2000.
    • (2000) NAI Labs Technical Report #00-010 , vol.10
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 7
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, California, May 11-14
    • H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197-213, Berkeley, California, May 11-14 2003.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 9
    • 33745178053 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • Syracuse University, July
    • W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. Technical Report, Syracuse University, July 2003. Available from http://www.cis.syr.edu/ ~wedu/Research/paper/ddhcv03.pdf.
    • (2003) Technical Report
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 10
    • 0001540595 scopus 로고
    • On random graphs I
    • Erdos and Rényi. On random graphs I. Publ. Math. Debrecen, 6:290-297, 1959.
    • (1959) Publ. Math. Debrecen , vol.6 , pp. 290-297
    • Erdos1    Rényi2
  • 15
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B. C. Neuman and T. Tso. Kerberos: An authentication service for computer networks. IEEE Communications, 32(9):33-38, September 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Tso, T.2
  • 17
    • 0003525992 scopus 로고
    • Cambridge, MA: Mass. Inst. Tech., second edition
    • W. W. Peterson. Error-Correcting Codes. Cambridge, MA: Mass. Inst. Tech., second edition, 1972.
    • (1972) Error-correcting Codes
    • Peterson, W.W.1
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.