메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 134-141

Replication attack on random key pre-distribution schemes for wireless sensor networks

Author keywords

Attack; Combinatorics; Key management; Security; Sensor networks; Statistics

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; COMPUTER SIMULATION; CRYPTOGRAPHY; CYBERNETICS; INFORMATION TECHNOLOGY; SECURITY OF DATA; SENSORS;

EID: 33745438469     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAW.2005.1495944     Document Type: Conference Paper
Times cited : (12)

References (14)
  • 5
    • 33745438469 scopus 로고    scopus 로고
    • Replication attack on random key pre-disiribution schemes for wireless sensor networks
    • Available Upon Request, Mar.
    • H. Fu, S. Kawamura, M. Zhang, and L. Zhang, "Replication attack on random key pre-disiribution schemes for wireless sensor networks," Available Upon Request, Information Assurance and Security Lab Tech. Rep. #05-001, Mar. 2005.
    • (2005) Information Assurance and Security Lab Tech. Rep. #05-001 , vol.5 , Issue.1
    • Fu, H.1    Kawamura, S.2    Zhang, M.3    Zhang, L.4
  • 7
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor security
    • Network Associates, Inc., Glenwood, MD
    • D. Carman, P. Kruus, and B. Matt, "Constraints and approaches for distributed sensor security," Network Associates, Inc., Glenwood, MD, NAI Labs Tech. Rep. #00-010, 2000.
    • (2000) NAI Labs Tech. Rep. #00-010 , Issue.10
    • Carman, D.1    Kruus, P.2    Matt, B.3
  • 9
    • 4243082091 scopus 로고    scopus 로고
    • Security in wirelss sensor networks
    • June
    • A. Perrig, R. Szewczyk, and D. Wagner, "Security in wirelss sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Szewczyk, R.2    Wagner, D.3
  • 10
    • 0003237987 scopus 로고
    • The kerberos network authentication service (v5)
    • J. Kohl and B. Neuman, "The kerberos network authentication service (v5)," RFC 1510, 1993.
    • (1993) RFC , vol.1510
    • Kohl, J.1    Neuman, B.2
  • 11
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, vol. 21, no. 12, pp. 993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 13
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • Paris, France. Apr.
    • _, "Low cost attacks on tamper resistant devices," in Proc. of the 5th Int. Workshop LNCS 1361, Paris, France. Apr. 1997, pp. 125-136.
    • (1997) Proc. of the 5th Int. Workshop LNCS , vol.1361 , pp. 125-136
  • 14
    • 85093467807 scopus 로고    scopus 로고
    • Design principles for tamper-resistant smartcard processors
    • Chicago, Illinois, USA. May 10-11
    • O. Kömmerling and M. Kuhn, "Design principles for tamper-resistant smartcard processors," in Proc. of the USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA. May 10-11, 1999, pp. 9-20.
    • (1999) Proc. of the USENIX Workshop on Smartcard Technology , pp. 9-20
    • Kömmerling, O.1    Kuhn, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.