메뉴 건너뛰기




Volumn 17, Issue 8, 2006, Pages 865-882

Location-aware combinatorial key management scheme for clustered sensor networks

Author keywords

Collusion attacks; Combinatorial optimization; Energy efficient design; Exclusion basis systems; Key management; Location aware protocols; Secure group communications; Wireless sensor networks

Indexed keywords

COMPUTER SIMULATION; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; HIERARCHICAL SYSTEMS; NETWORK PROTOCOLS; OPTIMIZATION; SECURITY OF DATA;

EID: 33646921841     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2006.106     Document Type: Article
Times cited : (233)

References (47)
  • 3
    • 1842815887 scopus 로고    scopus 로고
    • "Security in Mobile Ad-Hoc Wireless Networks: Challenges and Solutions"
    • Feb
    • H. Yang et al., "Security in Mobile Ad-Hoc Wireless Networks: Challenges and Solutions," IEEE Wireless Comm. Magazine, vol. 11, no. 1, pp. 38-47, Feb. 2004.
    • (2004) IEEE Wireless Comm. Magazine , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1
  • 4
    • 0033357103 scopus 로고    scopus 로고
    • "Securing Ad Hoc Networks"
    • Nov./Dec
    • L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Networks, vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
    • (1999) IEEE Networks , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 5
    • 0010461175 scopus 로고    scopus 로고
    • "Constraints and Approaches for Distributed Sensor Networks Security"
    • Technical Report 00-010, NAI Labs, Sept
    • D. Carman, P. Kruus, and B. Matt, "Constraints and Approaches for Distributed Sensor Networks Security," Technical Report 00-010, NAI Labs, Sept. 2000.
    • (2000)
    • Carman, D.1    Kruus, P.2    Matt, B.3
  • 7
    • 33746045935 scopus 로고    scopus 로고
    • TinySec
    • TinySec, http://www.cs.berkeley.edu/nks/tinysec/, 2006.
    • (2006)
  • 11
    • 10944266504 scopus 로고    scopus 로고
    • "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks"
    • Oct.-Dec
    • O. Younis and S. Fahmy, "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks," IEEE Trans. Mobile Computing, vol. 3, no. 4, pp. 366-379, Oct.-Dec. 2004.
    • (2004) IEEE Trans. Mobile Computing , vol.3 , Issue.4 , pp. 366-379
    • Younis, O.1    Fahmy, S.2
  • 12
    • 0141509888 scopus 로고    scopus 로고
    • "Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison"
    • Nov
    • K. Langendoen and N. Reijers, "Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison," Computer Networks, vol. 43, no. 4, pp. 499-518, Nov. 2003.
    • (2003) Computer Networks , vol.43 , Issue.4 , pp. 499-518
    • Langendoen, K.1    Reijers, N.2
  • 14
    • 2442607915 scopus 로고    scopus 로고
    • "Mica: The Commercialization of Microsensor Motes"
    • Apr
    • M. Horton et al., "Mica: The Commercialization of Microsensor Motes," Sensors Online Magazine, http://www.sensorsmag.com/articles/0402/40/main.shtml, Apr. 2002.
    • (2002) Sensors Online Magazine
    • Horton, M.1
  • 18
    • 1442357062 scopus 로고    scopus 로고
    • "US Secure Hash Algorithm 1 (SHA-1)"
    • RFC 3174, IETF, Sept
    • D. Eastlake and P. Jones, "US Secure Hash Algorithm 1 (SHA-1)," RFC 3174, IETF, Sept. 2001.
    • (2001)
    • Eastlake, D.1    Jones, P.2
  • 19
    • 0003602325 scopus 로고
    • "The MD5 Message-Digest Algorithm"
    • RFC 1320, MIT and RSA Data Security, Inc., Apr
    • R. Rivest, "The MD5 Message-Digest Algorithm," RFC 1320, MIT and RSA Data Security, Inc., Apr. 1992.
    • (1992)
    • Rivest, R.1
  • 21
    • 0003677229 scopus 로고    scopus 로고
    • second ed. Springer-Verlag, Feb
    • R. Diestel, Graph Theory, second ed. Springer-Verlag, Feb. 2000.
    • (2000) Graph Theory
    • Diestel, R.1
  • 22
    • 0028514601 scopus 로고
    • "Kerberos: An Authentication Service for Computer Networks"
    • Sept
    • C. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm., vol. 32, no. 9, pp. 33-38, Sept. 1994.
    • (1994) IEEE Comm. , vol.32 , Issue.9 , pp. 33-38
    • Neuman, C.1    Ts'o, T.2
  • 23
    • 0142094198 scopus 로고    scopus 로고
    • "Energy-Aware Management in Cluster-Based Sensor Networks"
    • Dec
    • M. Younis, M. Youssef, and K. Arisha, "Energy-Aware Management in Cluster-Based Sensor Networks," Computer Networks, vol. 43, no. 5, pp. 649-668, Dec. 2003.
    • (2003) Computer Networks , vol.43 , Issue.5 , pp. 649-668
    • Younis, M.1    Youssef, M.2    Arisha, K.3
  • 24
    • 0345565893 scopus 로고    scopus 로고
    • "A Survey of Key Management for Secure Group Communication"
    • Sept
    • S. Rafaeli and D. Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sept. 2003.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 25
    • 0003460574 scopus 로고    scopus 로고
    • "Group Key Management Protocol (GKMP) Specification"
    • Report # RFC 2093, The Internet Soc. (ISOC)
    • H. Harney and C. Muckenhirn, "Group Key Management Protocol (GKMP) Specification," Report # RFC 2093, The Internet Soc. (ISOC), 1997.
    • (1997)
    • Harney, H.1    Muckenhirn, C.2
  • 26
    • 0003978251 scopus 로고    scopus 로고
    • "Key Management for Multicast: Issues and Architectures"
    • Report # RFC 2627, The Internet Soc. (ISOC), Reston, Va
    • D. Wallner, E Harder, and R. Agee, "Key Management for Multicast: Issues and Architectures," Report # RFC 2627, The Internet Soc. (ISOC), Reston, Va., 1999.
    • (1999)
    • Wallner, D.1    Harder, E.2    Agee, R.3
  • 27
    • 0033893174 scopus 로고    scopus 로고
    • "Secure Group Communications Using Key Graphs"
    • Feb
    • K. Wong, M. Gouda, and S. Lam, "Secure Group Communications Using Key Graphs," IEEE/ACM Trans. Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
    • (2000) IEEE/ACM Trans. Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, K.1    Gouda, M.2    Lam, S.3
  • 30
    • 0344908112 scopus 로고    scopus 로고
    • "MARKS: Multicast Key Management Using Arbitrarily Revealed Key Sequences"
    • Nov
    • B. Brisco, "MARKS: Multicast Key Management Using Arbitrarily Revealed Key Sequences," Proc. First Int'l Workshop Networked Group Comm., Nov. 1999.
    • (1999) Proc. First Int'l Workshop Networked Group Comm.
    • Brisco, B.1
  • 37
    • 2942656255 scopus 로고    scopus 로고
    • "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures"
    • Sept
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," J. Ad-Hoc Networks, vol. 1, nos. 2-3, pp. 293-315, Sept. 2003.
    • (2003) J. Ad-Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 43
    • 3042575345 scopus 로고    scopus 로고
    • "Establishing Pair-Wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach"
    • Technical Report ISE-TR-03-01, George Mason Univ., Mar
    • S. Zhu, S. Xu, S. Setia, and S. Jajodia "Establishing Pair-Wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach," Technical Report ISE-TR-03-01, George Mason Univ., Mar. 2003.
    • (2003)
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 44
    • 27644505653 scopus 로고    scopus 로고
    • "Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust"
    • SDL Technical Report SRI-SDL-04-02, Apr
    • B. Dutertre, S. Cheung, and J. Levy, "Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust," SDL Technical Report SRI-SDL-04-02, Apr. 2004.
    • (2004)
    • Dutertre, B.1    Cheung, S.2    Levy, J.3
  • 45
    • 85016596484 scopus 로고    scopus 로고
    • "LiSP: A Lightweight Security Protocol for Wireless Sensor Networks"
    • Aug
    • T. Park and K.G. Shin, "LiSP: A Lightweight Security Protocol for Wireless Sensor Networks," ACM Trans. Embedded Computing Systems, vol. 3, no. 3, pp. 634-660, Aug. 2004.
    • (2004) ACM Trans. Embedded Computing Systems , vol.3 , Issue.3 , pp. 634-660
    • Park, T.1    Shin, K.G.2
  • 46
    • 15744395962 scopus 로고    scopus 로고
    • "TEA Extensions"
    • technical report, Computer Laboratory, Univ. of Cambridge, Oct
    • R.M. Needham and D.J. Wheeler, "TEA Extensions," technical report, Computer Laboratory, Univ. of Cambridge, Oct. 1997.
    • (1997)
    • Needham, R.M.1    Wheeler, D.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.