메뉴 건너뛰기




Volumn 6, Issue 7, 2006, Pages 1017-1035

Dynamic combinatorial key management scheme for sensor networks

Author keywords

Collusion attacks; Confidentiality; Exclusion basis systems; Key management; Localization; Location aware protocols; Secure group communications; Sensor networks

Indexed keywords

COMMUNICATION SYSTEMS; COMPUTATIONAL METHODS; NETWORK PROTOCOLS; SELF ORGANIZING MAPS; SENSORS;

EID: 33751174487     PISSN: 15308669     EISSN: None     Source Type: Journal    
DOI: 10.1002/wcm.435     Document Type: Article
Times cited : (15)

References (42)
  • 5
    • 21844433206 scopus 로고    scopus 로고
    • Group key management scheme for large-scale Wireless Sensor Network
    • Eltoweissy M, Wadaa A, Olariu S, Wilson L. Group key management scheme for large-scale Wireless Sensor Network. Ad-Hoc Networks 2005; 3(5): 668-688.
    • (2005) Ad-hoc Networks , vol.3 , Issue.5 , pp. 668-688
    • Eltoweissy, M.1    Wadaa, A.2    Olariu, S.3    Wilson, L.4
  • 6
    • 0142094198 scopus 로고    scopus 로고
    • Energy-aware management in cluster-based Sensor Networks
    • Younis M. Youssef M, Arisha K. Energy-Aware management in cluster-based Sensor Networks. Computer Networks, 2003; 43(5): 649-668.
    • (2003) Computer Networks , vol.43 , Issue.5 , pp. 649-668
    • Younis, M.1    Youssef, M.2    Arisha, K.3
  • 11
    • 3042575345 scopus 로고    scopus 로고
    • Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
    • March
    • Zhu S, Xu S, Setia S, Jajodia S. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach, George Mason University, Tech. Rep. ISE-TR-03-01, March 2003.
    • (2003) George Mason University, Tech. Rep. , vol.ISE-TR-03-01
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 12
    • 27644505653 scopus 로고    scopus 로고
    • Lightweight key management in Wireless Sensor Networks by leveraging initial trust
    • April 6
    • Dutertre B, Cheung S, Levy J. Lightweight key management in Wireless Sensor Networks by leveraging initial trust. SDL Technical Report SRI-SDL-04-02, April 6, 2004.
    • (2004) SDL Technical Report , vol.SRI-SDL-04-02
    • Dutertre, B.1    Cheung, S.2    Levy, J.3
  • 19
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in Sensor Networks
    • Perrig A, Chan H. PIKE: Peer intermediaries for key establishment in Sensor Networks. IEEE Infocom 2005.
    • (2005) IEEE Infocom
    • Perrig, A.1    Chan, H.2
  • 22
    • 10944266504 scopus 로고    scopus 로고
    • HEED: A hybrid, energy-efficient, distributed clustering Approach for ad hoc Sensor Networks
    • Younis O, Fahmy S. HEED: a hybrid, energy-efficient, distributed clustering Approach for ad hoc Sensor Networks. IEEE Transactions on Mobile Computing 2004; 3(4): 366-379.
    • (2004) IEEE Transactions on Mobile Computing , vol.3 , Issue.4 , pp. 366-379
    • Younis, O.1    Fahmy, S.2
  • 23
    • 0141509888 scopus 로고    scopus 로고
    • Distributed localization in Wireless Sensor Networks: A quantitative comparison
    • Computer Networks (Elsevier), August
    • Langendoen K, Reijers N. Distributed localization in Wireless Sensor Networks: a quantitative comparison. Computer Networks (Elsevier), special issue on Wireless Sensor Networks, August 2003.
    • (2003) Special Issue on Wireless Sensor Networks
    • Langendoen, K.1    Reijers, N.2
  • 25
    • 33751187249 scopus 로고    scopus 로고
    • A novel architecture for secure group communication in Wireless Ad-Hoc Networks with application-level multicast
    • Bangalore, India, December
    • Mukkamala R, Moharrum M, Eltoweissy M. A novel architecture for secure group communication in Wireless Ad-Hoc Networks with application-level multicast. In Proceedings of Workshop on Trusted Internet, Bangalore, India, December 2004.
    • (2004) Proceedings of Workshop on Trusted Internet
    • Mukkamala, R.1    Moharrum, M.2    Eltoweissy, M.3
  • 27
    • 1542265638 scopus 로고    scopus 로고
    • US secure hash algorithm 1 (SHA-1)
    • September IETF
    • Eastlake D, Jones P. US secure hash algorithm 1 (SHA-1), September 2001, RFC 3174, IETF.
    • (2001) RFC , vol.3174
    • Eastlake, D.1    Jones, P.2
  • 28
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • MIT and RSA Data Security, Inc., April
    • Rivest R. The MD5 message-digest algorithm. RFC 1320, MIT and RSA Data Security, Inc., April 1992.
    • (1992) RFC , vol.1320
    • Rivest, R.1
  • 31
    • 0034229951 scopus 로고    scopus 로고
    • PicoRadio supports ad hoc ultra low power wireless networking
    • Rabaey J, Ammer M, Silva J, Jr., Patel D, Roundy S. PicoRadio supports ad hoc ultra low power wireless networking. IEEE Computer 2000; 33(7): 42-48.
    • (2000) IEEE Computer , vol.33 , Issue.7 , pp. 42-48
    • Rabaey, J.1    Ammer, M.2    Silva Jr., J.3    Patel, D.4    Roundy, S.5
  • 40
    • 25844473466 scopus 로고    scopus 로고
    • Group re-keying for filtering false data in Sensor Networks: A predistribution and local collaboration-based approach
    • March
    • Zhang W, Cao G. Group re-keying for filtering false data in Sensor Networks: a predistribution and local collaboration-based approach. IEEE INFOCOM, March 2005.
    • (2005) IEEE INFOCOM
    • Zhang, W.1    Cao, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.