메뉴 건너뛰기




Volumn 29, Issue 13-14, 2006, Pages 2556-2568

A lightweight secure protocol for wireless sensor networks

Author keywords

Linear congruential generator; Security; Wireless sensor networks

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; DATA PRIVACY; SECURITY OF DATA; SENSORS; SPURIOUS SIGNAL NOISE;

EID: 33746734206     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2006.02.006     Document Type: Article
Times cited : (18)

References (37)
  • 2
    • 33746668624 scopus 로고    scopus 로고
    • Crossbow Technology Incorporation. .
  • 4
    • 33746767511 scopus 로고    scopus 로고
    • J. Heinrich, Detecting a Bad Ran dom Number Generator, Technical Re-port:CDF/MEMO/STATISTICS/PUBLIC/6850, University of Pennsylvania, 2004.
  • 5
    • 0021819410 scopus 로고
    • Deciphering a linear congruential encryption"
    • Knuth D.E. Deciphering a linear congruential encryption". IEEE Transactions on Information Theory 31 1 (1985) 49-52
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.1 , pp. 49-52
    • Knuth, D.E.1
  • 6
    • 0024303956 scopus 로고
    • Inferring sequences produced by pseudo-random number generators
    • Boyar J. Inferring sequences produced by pseudo-random number generators. Journal of the ACM 36 1 (1989) 129-141
    • (1989) Journal of the ACM , vol.36 , Issue.1 , pp. 129-141
    • Boyar, J.1
  • 7
    • 0020271558 scopus 로고    scopus 로고
    • J.P. Plumstead (Boyar), Inferring a sequence generated by a linear congruence, in: Proceedings of the 23rd Annual IEEE Symposium on the Foundations of Computer Science, 1982, pp. 153-159.
  • 8
    • 0012168966 scopus 로고
    • How to predict congruential generators
    • Krawczyk H. How to predict congruential generators. Journal of Algorithms 13 4 (1992) 527-545
    • (1992) Journal of Algorithms , vol.13 , Issue.4 , pp. 527-545
    • Krawczyk, H.1
  • 9
    • 84950827947 scopus 로고
    • The efficient generation of cryptographic confusion sequences"
    • Ritter T. The efficient generation of cryptographic confusion sequences". Cryptologia 15 2 (1991) 81-139
    • (1991) Cryptologia , vol.15 , Issue.2 , pp. 81-139
    • Ritter, T.1
  • 11
    • 10044284351 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: Proceedings of ACM Conference on Computer and Communications Security (ACM CCS), Washington, DC, 2004, pp. 62-72.
  • 13
    • 28444433009 scopus 로고    scopus 로고
    • H. Chan, A. Perrig, D. Song, Random Key Predistribution Schemes for Sensor Networks, IEEE Security and Privacy, Oakland CA, 2003, pp. 197-213.
  • 15
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, V. Gligor, A key-management scheme for distributed sensor networks, in: Proceedings of ACM Conference on Computer and Communications Security (ACM CCS), Washington, DC, 2002, pp. 41-47.
  • 16
    • 3042822764 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proceedings of ACM Conference on Computer and Communications Security (ACM CCS), Washington, DC, 2003, pp. 52-61.
  • 17
    • 84943553152 scopus 로고    scopus 로고
    • S. Zhu, S. Xu, S. Setia, S. Jajodia, Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Ap proach, 11th IEEE International Conference on Network Protocols (ICNP), Atlanta, GA, 2003, pp. 326-335.
  • 18
    • 26444574670 scopus 로고    scopus 로고
    • C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: Proceedings of the Second International Conference on Embedded networked Sensor Systems, Baltimore, MD, USA, pp. 162-175.
  • 19
    • 84948990100 scopus 로고    scopus 로고
    • R. Rivest, The RC5 Encryption Algorithm, in: Proceedings of the First Workshop on Fast Software Encryption, 1995, pp. 86-96.
  • 20
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare M., Kilian J., and Rogaway P. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61 3 (2000) 363-399
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 363-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems"
    • Rivest R.L., Shamir A., and Adleman L.M. A method for obtaining digital signatures and public-key cryptosystems". Communications of the ACM 21 2 (1978) 120-126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 23
    • 0017018484 scopus 로고    scopus 로고
    • W. Diffie, M.E. Hellman, New directions in cryptography, in: IEEE Transaction on Information Theory, IT-22:644C654, 1976.
  • 24
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • Rivest R. The MD5 message-digest algorithm. IETF RFC 1321 (1992)
    • (1992) IETF RFC , vol.1321
    • Rivest, R.1
  • 25
    • 1542265638 scopus 로고    scopus 로고
    • US secure hash algorithm 1 (SHA1)
    • Eastlake D., and Jones P. US secure hash algorithm 1 (SHA1). IETF RFC 3174 (2001)
    • (2001) IETF RFC , vol.3174
    • Eastlake, D.1    Jones, P.2
  • 26
    • 33746668013 scopus 로고    scopus 로고
    • Skipjack and KEA algorithm specifications. , NIST, 1998.
  • 27
    • 33746758193 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, in: Proceedings of the 10th Network and Distributed System Security Symposium (NDSS'03), San Diego, CA, 2003, pp. 263-276.
  • 28
    • 33746757576 scopus 로고    scopus 로고
    • L. Hu, D. Evans, Secure Aggregation for Wireless Networks, Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, 2003.
  • 31
    • 51749087865 scopus 로고    scopus 로고
    • C.-C Li, B. Sun, Using linear congruential generators for cryptographic purposes, in: Proceedings of the 20th International Conference on Computers and Their Applications, New Orleans, LA, 2005.
  • 32
    • 33746720818 scopus 로고    scopus 로고
    • D. Carman, P. Kruus, B. Matt, Constraints and Approaches for Distributed Sensor Network Security, NAI Labs Technical Report No. 00010, 2000.
  • 33
    • 18844411823 scopus 로고    scopus 로고
    • J. Zhao,R. Govindan, Understanding Packet Delivery Performance In Dense Wireless Sensor Networks, in: Proceedings of the First International Conference on Embedded networked sensor systems (ACM Sensys'03), Los Angeles, CA, 2003, pp. 1-13.
  • 34
    • 20344370718 scopus 로고    scopus 로고
    • O. Gnawalix, M. Yarvisz, J. Heidemanny, Ramesh Govindan, Interaction of retransmission, blacklisting, and routing metrics for reliability in sensor network routing, in: The First IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON'04), Santa Clara, October 4-7, 2004, pp. 34-43.
  • 35
    • 0036980191 scopus 로고    scopus 로고
    • C.-Y Wan, A.T. Campbell, L. Krishnamurthy, PSFQ: a reliable transport protocol for wireless sensor networks, in: International Workshop on Wireless Sensor Networks and Applications (WSNA '02), Atlanta, GA, 2002, pp. 1-11.
  • 37
    • 84884730529 scopus 로고    scopus 로고
    • R. Blom, An Optimal Class of Symmetric Key Generation Schemes, Advance in Cryptography EUROCRYPT, 1985, Lecture Notes in Computer Science, Vol, 209, Springer-Verlag, 1985, pp. 335-338.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.