메뉴 건너뛰기




Volumn 5, Issue 1, 2007, Pages 49-62

ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks

Author keywords

Authentication; Cooperation; Key distribution and management; Probabilistic key sharing; Wireless sensor networks

Indexed keywords

AUTHENTICATION; COOPERATION; KEY DISTRIBUTION AND MANAGEMENT; PROBABILISTIC KEY SHARING; WIRELESS SENSOR NETWORKS;

EID: 33749984561     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2006.05.013     Document Type: Article
Times cited : (24)

References (26)
  • 3
    • 33750014364 scopus 로고    scopus 로고
    • Ross Anderson, Markus G. Kuhn. Tamper resistance-a cautionary note, in: The 2nd USENIX Workshop on Electronic Commerce Proceedings, 1996, pp. 1-11.
  • 4
    • 25844457423 scopus 로고    scopus 로고
    • Antonio Caruso, Alessandro Urpi, Stefano Chessa, Swades De, Gps-free coordinate assignment and routing in wireless sensor networks, in: Proceedings of IEEE INFOCOM'05, 2005, pp. 150-160.
  • 5
    • 25844435733 scopus 로고    scopus 로고
    • Haowen Chan, Adrian Perrig. PIKE: Peer intermediaries for key establishment in sensor networks, in: Proceedings of IEEE INFOCOM'05, 2005, pp. 524-535.
  • 6
    • 28444433009 scopus 로고    scopus 로고
    • Haowen Chan, Adrian Perrig, Dawn Song, Random key predistribution schemes for sensor networks, in: Proceedings of IEEE S&P'03, 2003, pp. 197-213.
  • 7
    • 34548126116 scopus 로고    scopus 로고
    • Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, Alessandro Mei. Requirements and open issues in distributed detection of node identity replicas in WSN, in: Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics (SMC'06), Special Session on Wireless Sensor Networks, in press.
  • 8
    • 33749625947 scopus 로고    scopus 로고
    • Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks, Wireless Networks, Corrected Proof, Available Online, May 2006.
  • 9
    • 12444324513 scopus 로고    scopus 로고
    • Providing secrecy in key management protocols for large wireless sensors networks
    • Di Pietro R., Mancini L.V., and Jajodia S. Providing secrecy in key management protocols for large wireless sensors networks. Journal of Ad Hoc Networks 1 4 (2003) 455-468
    • (2003) Journal of Ad Hoc Networks , vol.1 , Issue.4 , pp. 455-468
    • Di Pietro, R.1    Mancini, L.V.2    Jajodia, S.3
  • 10
    • 4544301464 scopus 로고    scopus 로고
    • Roberto Di Pietro, Luigi Vincenzo Mancini, Alessandro Mei, Random key-assignment for secure wireless sensor networks, in: Proceedings of ACM SASN'03, 2003, pp. 62-71.
  • 11
    • 12444300139 scopus 로고    scopus 로고
    • Roberto Di Pietro, Luigi Vincenzo Mancini, Alessandro Mei, Efficient and resilient key discovery based on pseudo-random key pre-deployment, in: Proceedings of IEEE IPDPS'04, 2004, pp. 217-224.
  • 12
    • 14844295528 scopus 로고    scopus 로고
    • Roberto Di Pietro, Luigi Vincenzo Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan, Connectivity properties of secure wireless sensor networks, in: Proceedings of ACM SASN'04, 2004, pp. 53-58.
  • 14
    • 3042783638 scopus 로고    scopus 로고
    • Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proceedings of ACM CCS'03, 2003, pp. 42-51.
  • 15
    • 0038341106 scopus 로고    scopus 로고
    • Laurent Eschenauer, Virgil D. Gligor, A key-management scheme for distributed sensor networks, in: Proceedings of ACM CCS'02, 2002, pp. 41-47.
  • 17
    • 33750008779 scopus 로고    scopus 로고
    • Donggang Liu, Peng Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, in: Proceedings of ISOC NDSS'03, 2003, pp. 263-276.
  • 18
    • 3042822764 scopus 로고    scopus 로고
    • Donggang Liu, Peng Ning, Establishing pairwise keys in distributed sensor networks, in: Proceedings ACM CCS'03, 2003, pp. 52-61.
  • 19
    • 3042785862 scopus 로고    scopus 로고
    • James Newsome, Elaine Shi, Dawn Song, Adrian Perrig, The sybil attack in sensor networks: analysis and defenses, in: Proceedings of ACM IPSN'04, 2004, pp. 259-268.
  • 20
    • 27544460282 scopus 로고    scopus 로고
    • Bryan Parno, Adrian Perrig, Virgil D. Gligor, Distributed detection of node replication attacks in sensor networks, in: Proceedings of IEEE S&P'05, pp. 49-63, Washington, DC, USA, 2005.
  • 21
    • 85177226984 scopus 로고    scopus 로고
    • Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J.D. Tygar, SPINS: security protocols for sensor networks, in: Proceedings of ACM/IEEE MobiCom'01, 2001, pp. 189-199.
  • 22
    • 33748994965 scopus 로고    scopus 로고
    • D. Sanchez Sanchez, Heribert Baldus, A deterministic pairwise key pre-distribution scheme for mobile sensor networks, in: Proceedings of the 1st IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm'05), pp. 277-288.
  • 23
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM 22 11 (1979) 612-613
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 24
    • 33646581008 scopus 로고    scopus 로고
    • Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling Chang Shantz, Energy analysis of public-key cryptography for wireless sensor networks, In PerCom, 2005, pp. 324-328.
  • 25
    • 10044284351 scopus 로고    scopus 로고
    • Sencun Zhu, Sanjeev Setia, Sushil Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: Proceedings ACM CCS'03, 2003, pp. 62-72.
  • 26
    • 84943553152 scopus 로고    scopus 로고
    • Sencun Zhu, Shouhoui Xu, Sanjeev Setia, Sushil Jajodia, Establishing pair-wise keys for secure communication in ad hoc networks: a probabilistic approach, in: Proceedings of IEEE ICNP'03, 2003, p. 326.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.