메뉴 건너뛰기




Volumn 3, Issue 1, 2006, Pages 62-77

A key predistribution scheme for sensor networks using deployment knowledge

Author keywords

Key predistribution; Network security; Wireless sensor networks

Indexed keywords

CONSTRAINT THEORY; CRYPTOGRAPHY; MATHEMATICAL MODELS; RANDOM PROCESSES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 32844459414     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2006.2     Document Type: Article
Times cited : (199)

References (24)
  • 1
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sept.
    • B.C. Neuman and T. Tso, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm., vol. 32, no. 9, pp. 33-38, Sept. 1994.
    • (1994) IEEE Comm. , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Tso, T.2
  • 5
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," IEEE Symp. Security and Privacy, pp. 197-213, 2003.
    • (2003) IEEE Symp. Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 9
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • W. Du, J. Deng, Y.S. Han, S. Chen, and P. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," Proc. IEEE INFOCOM '04, pp. 586-597, 2004.
    • (2004) Proc. IEEE INFOCOM '04 , pp. 586-597
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.5
  • 11
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • H. Chan and A. Perrig, "PIKE: Peer Intermediaries for Key Establishment in Sensor Networks," Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Chan, H.1    Perrig, A.2
  • 16
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • M. Beller and Y. Yacobi, "Fully-Fledged Two-Way Public Key Authentication and Key Agreement for Low-Cost Terminals," Electronics Letters, vol. 29, no. 11, pp. 999-1001, 1993.
    • (1993) Electronics Letters , vol.29 , Issue.11 , pp. 999-1001
    • Beller, M.1    Yacobi, Y.2
  • 17
    • 84956854891 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications: A selective survey
    • C. Boyd and A. Mathuria, "Key Establishment Protocols for Secure Mobile Communications: A Selective Survey," Lecture Notes in Computer Science, vol. 1438, pp. 344-355, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1438 , pp. 344-355
    • Boyd, C.1    Mathuria, A.2
  • 18
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Advances in Cryptology: Proc. EUROCRYPT '84, pp. 335-338, 1985.
    • (1985) Advances in Cryptology: Proc. EUROCRYPT '84 , pp. 335-338
    • Blom, R.1
  • 20
    • 0003582910 scopus 로고    scopus 로고
    • C.E. Perkins, ed. Addison-Wesley
    • Ad Hoc Networking, C.E. Perkins, ed. Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking
  • 22
    • 0041939724 scopus 로고    scopus 로고
    • Unreliable sensor grids: Coverage, connectivity, and diameter
    • S. Shakkottai, R. Srikant, and N. Shroff, "Unreliable Sensor Grids: Coverage, Connectivity, and Diameter," Proc. IEEE INFOCOM, pp. 1073-1083, 2003.
    • (2003) Proc. IEEE INFOCOM , pp. 1073-1083
    • Shakkottai, S.1    Srikant, R.2    Shroff, N.3
  • 24
    • 84858546210 scopus 로고    scopus 로고
    • 2006
    • Crossbow Technology, Inc., http://www.xbow.com/, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.