메뉴 건너뛰기




Volumn 12, Issue 6, 2006, Pages 709-721

Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks

Author keywords

Confidentiality; Energy saving; Information leakage; Key management; Probabilistic authentication; Wireless sensor networks

Indexed keywords

ENERGY SAVING; INFORMATION LEAKAGE; KEY MANAGEMENT; PROBABILISTIC AUTHENTICATION; WIRELESS SENSOR NETWORKS;

EID: 33749625947     PISSN: 10220038     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11276-006-6530-5     Document Type: Article
Times cited : (64)

References (38)
  • 8
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • Springer-Verlag, editor, Advances in Cryptology: Proceedings of EUROCRYPT '84
    • R. Blom, An optimal class of symmetric key generation systems, in Springer-Verlag, editor, Advances in Cryptology: Proceedings of EUROCRYPT '84, vol. 338 of LNCS (1985).
    • (1985) LNCS , vol.338
    • Blom, R.1
  • 9
    • 85028765277 scopus 로고
    • Perfectly-secure key distribution for dynamic conferences
    • Springer-Verlag, editor, Advances in Cryptology: Proceedings of CRYPTO '92
    • C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, Perfectly-secure key distribution for dynamic conferences, in Springer-Verlag, editor, Advances in Cryptology: Proceedings of CRYPTO '92, vol. 740 of LNCS (1993).
    • (1993) LNCS , vol.740
    • Blundo, C.1    De Santis, A.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 10
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • NAI Labs
    • D.W. Carman, P.S. Kruus and B.J. Matt, Constraints and approaches for distributed sensor network security, Technical Report #00-010, NAI Labs (2000).
    • (2000) Technical Report #00-010 , Issue.10
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 11
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Oakland, California, USA, (11-14, May)
    • H. Chan, A. Perrig and D. Song, random key predistribution schemes for sensor networks, in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, USA, (11-14, May 2003) pp. 197-213.
    • (2003) Proceedings of the IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 12
    • 4644360171 scopus 로고    scopus 로고
    • Maximum lifetime routing in wireless sensor networks
    • J.-H. Chang and L. Tassiulas, Maximum lifetime routing in wireless sensor networks, IEEE/ACM Trans. Netw., 12(4) (2004) 609-619.
    • (2004) IEEE/ACM Trans. Netw. , vol.12 , Issue.4 , pp. 609-619
    • Chang, J.-H.1    Tassiulas, L.2
  • 13
    • 33749633752 scopus 로고    scopus 로고
    • Crossbow Technology Inc., URL: http://www.xbow.com.
  • 14
    • 12444324513 scopus 로고    scopus 로고
    • Providing secrecy in key management protocols for large wireless sensors networks
    • R. Di Pietro, L.V. Mancini and S. Jajodia, Providing secrecy in key management protocols for large wireless sensors networks, Journal of AdHoc Networks, 1(4) (2003) 455-468.
    • (2003) Journal of AdHoc Networks , vol.1 , Issue.4 , pp. 455-468
    • Di Pietro, R.1    Mancini, L.V.2    Jajodia, S.3
  • 18
    • 33749604627 scopus 로고    scopus 로고
    • PhD thesis, Università "La Sapienza", Dipartimento di Informatica, Roma-Italy (Feb.)
    • R. Di Pietro, Security issues for wireless sensor networks, PhD thesis, Università "La Sapienza", Dipartimento di Informatica, Roma-Italy (Feb. 2004).
    • (2004) Security Issues for Wireless Sensor Networks
    • Di Pietro, R.1
  • 22
    • 21844433206 scopus 로고    scopus 로고
    • Group key management scheme for large-scale wireless sensor network
    • M. Eltoweissy, A. Wadaa, S. Olariu and L. Wilson, Group key management scheme for large-scale wireless sensor network, Journal of Ad-Hoc Networks 3(1) (2005) 668-688.
    • (2005) Journal of Ad-hoc Networks , vol.3 , Issue.1 , pp. 668-688
    • Eltoweissy, M.1    Wadaa, A.2    Olariu, S.3    Wilson, L.4
  • 28
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, Journal of Adhoc Networks 1(2-3) (2003) 283-315.
    • (2003) Journal of Adhoc Networks , vol.1 , Issue.2-3 , pp. 283-315
    • Karlof, C.1    Wagner, D.2
  • 33
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B.C. Neuman and T. Tso, Kerberos: An authentication service for computer networks, IEEE Communications Magazine, 32(9) (1994) 33-38.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Tso, T.2
  • 34
    • 4444346335 scopus 로고    scopus 로고
    • Wireless sensor networks - Leveraging the virtual infrastructure
    • July/Aug.
    • S. Olariu, A. Wadaa, L. Wilson and M. Eltoweissy, Wireless sensor networks - Leveraging the virtual infrastructure, IEEE Network, (July/Aug. 2004) 51-56.
    • (2004) IEEE Network , pp. 51-56
    • Olariu, S.1    Wadaa, A.2    Wilson, L.3    Eltoweissy, M.4
  • 36
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • ACM Press
    • A. Perrig and J. Stankovic and D. Wagner, Security in wireless sensor networks, in Communications of the ACM, ACM Press 47(6) (2004) 53-57.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.