메뉴 건너뛰기




Volumn 30, Issue 9, 2007, Pages 1964-1979

Key management for long-lived sensor networks in hostile environments

Author keywords

Clustering; Hostile environments; Key management; Security; Sensor networks; Survivability

Indexed keywords

CLUSTER ANALYSIS; COMPUTER CRIME; COMPUTER RESOURCE MANAGEMENT; COMPUTER SIMULATION; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; TELECOMMUNICATION LINKS;

EID: 34250659309     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.02.022     Document Type: Article
Times cited : (19)

References (37)
  • 1
    • 85177172614 scopus 로고    scopus 로고
    • N. Borisov, I. Goldberg, D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: Proceedings of IEEE/ACM MobiCom, Italy, July 2001, pp. 180-189.
  • 2
    • 85177503976 scopus 로고    scopus 로고
    • Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of IEEE/ACM MobiCom, Boston MA, August 2000, pp. 275-283.
  • 3
    • 84966668611 scopus 로고    scopus 로고
    • R. Zhang, D. Qian, C. Bao, W. Wu, X. Guo, Multi-agent based intrusion detection architecture, in: Proceedings International Conference on Computer Networks and Mobile Computing, Beijing China, October 2001, pp. 494-501.
  • 4
    • 14844315770 scopus 로고    scopus 로고
    • S. Ganeriwal, M. Srivastava, Reputation-based framework for high integrity sensor networks, in: Proceedings of 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, October 2004, pp. 66-77.
  • 5
    • 34250643925 scopus 로고    scopus 로고
    • D. Johnson, D. Maltz, Y. Hu, The dynamic source routing protocol for mobile ad hoc networks (DSR), (Internet-Draft). Mobile Ad-hoc Network (MANET) Working Group, IETF, July 2004.
  • 6
    • 85016596484 scopus 로고    scopus 로고
    • T. Park, K. Shin, LiSP: a lightweight security protocol for wireless sensor networks, in: ACM Transactions on Embedded Computing Systems, vol. 3, no. 3, August 2004, pp. 634-660.
  • 7
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, V.D. Gligor. A key-management scheme for distributed MSN networks, in: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), Washington DC, November 2002, pp. 41-47.
  • 8
    • 34250648049 scopus 로고    scopus 로고
    • G. Jolly, M. Kusu, P. Kokate, A hierarchical key management method for low-energy wireless MSN networks, in: Proceedings of the 8th IEEE Symposium on Computers and Communication (ISCC), Turkey, July, 2003, pp. 335-340.
  • 9
    • 3042592224 scopus 로고    scopus 로고
    • M. Eltoweissy, A. Wadaa, S. Olariu, L. Wilson, Scalable cryptographic key management in wireless sensor networks, in: Proceedings of Distributed Computing Systems Workshops, Tokyo Japan, March 2004.
  • 10
    • 34250660905 scopus 로고    scopus 로고
    • W. Heinzelman, Application-specific protocol architectures for wireless networks, Ph.D. Dissertation, Massachusetts Institute of Technology, June 2000.
  • 11
    • 84961616351 scopus 로고    scopus 로고
    • S. Madden, R. Szewczyk, M. Franklin, D. Culler, Supporting aggregate queries over ad-hoc wireless MSN networks, in: Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon NY, June 2002, pp. 49-58.
  • 14
    • 2442478355 scopus 로고    scopus 로고
    • M. Eltoweissy, M. Younis, K. Ghumman, Lightweight key management for wireless MSN networks, in: Proceedings of IEEE International Conference on Performance, Computing, and Communications, Phoenix AZ, April 2004, pp. 813-818.
  • 15
    • 34250632345 scopus 로고    scopus 로고
    • M. Moharram, M. Eltoweissy, Key management schemes in sensor networks: dynamic versus static keying, in: ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN 2005), Montreal Canada, October 2005.
  • 16
    • 10044284351 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed MSN networks, in: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), Washington DC, October 2003, pp. 62-72.
  • 17
    • 34250621976 scopus 로고    scopus 로고
    • R. Moharrum, M. Mukkamala, M. Eltoweissy, CKDS: an efficient combinatorial key distribution scheme for wireless, in: Proceedings of International Conference on Performance, Computing, and Communications, Phoenix AZ, April 2004, pp. 630-636.
  • 18
    • 34250636663 scopus 로고    scopus 로고
    • D. Carman, P. Kruus, B. Matt, Constraints and approaches for distributed MSN network security, Network Associates Inc. (NAI) Labs Technical Report No.00010. September 2000.
  • 19
    • 11244265814 scopus 로고    scopus 로고
    • F. Kuhn, T. Moscibroda, R. Wattenhoffer, Initializing newly deployed ad hoc and sensor networks, in: Proceedings of International Conference on Mobile Computing and Networking (MobiCom04), Philadelphia PA, September 2004, pp. 260-274.
  • 21
    • 34250617030 scopus 로고    scopus 로고
    • B. Matt, A preliminary study of identity-based, group key establishment protocols for resource constrained battlefield networks, Network Associates Labs Technical Report 02-034, September 2002.
  • 22
    • 34250648048 scopus 로고    scopus 로고
    • D. Carman, B. Matt, G. Cirincione, Energy-efficient and low-latency key management for MSN networks, in: Proceedings of 23rd Army Science Conference, Orlando FL, December 2002.
  • 23
    • 28444433009 scopus 로고    scopus 로고
    • H. Chan, A. Perrig, D. Song, Random key predistribution schemes for MSN networks, in: Proceedings of IEEE Symposium on Security and Privacy, Oakland CA, May 2003, pp. 197-213.
  • 24
    • 8344262333 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Proceedings of IEEE INFOCOM'04, March 2004.
  • 25
    • 3042822764 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proceedings of ACM Conference on Computer and Communications Security (CCS), Washington DC, October 2003, pp. 52-61.
  • 26
    • 84858389516 scopus 로고    scopus 로고
    • G. Gupta, M. Younis, Performance evaluation of load-balanced clustering of wireless MSN networks, in: Proceedings of 10th International Conference on Telecommunications, Papeete, French Polynesia, February 2003, pp. 1577-1581.
  • 27
    • 34250633971 scopus 로고    scopus 로고
    • D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Next century challenges: scalable coordination in sensor networks, in: Proceedings of 5th International Conference on Mobile Computing and Networks (MobiCom), Seattle WA, August 1999, pp. 263-270.
  • 29
    • 34250673522 scopus 로고    scopus 로고
    • Sensoria corporation, WINS NG Power Usage Specification: WINS NG 1.0, January 2000. .
  • 30
    • 0041438298 scopus 로고    scopus 로고
    • J. Chou, D. Petrovis, K. Ramchandran, A distributed and adaptive signal processing approach to reducing energy consumption in sensor networks, in: Proceedings of IEEE INFOCOM, vol. 2, San Francisco CA, April 2003, pp. 1054-1062.
  • 31
    • 85034572933 scopus 로고    scopus 로고
    • W. Heinzelman, A. Chandrakasan, H. Balakrishnan, An application-specific protocol architecture for wireless microsensor networks, in: Proceedings of 33rd Hawaii International Conference on System Sciences, Maui HI, January 2000, pp. 3005-3014.
  • 32
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: attacks and countermeasures
    • Karl C., and Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks Journal 1 1 (2003) 293-315
    • (2003) Ad Hoc Networks Journal , vol.1 , Issue.1 , pp. 293-315
    • Karl, C.1    Wagner, D.2
  • 33
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Computer 35 10 (2002) 54-62
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 34
    • 0033893174 scopus 로고    scopus 로고
    • C.K. Wong, M. Gouda, S. Lam, Secure group communications using key graphs, in: Proceedings of IEEE Transactions on Networking, vol 8, no. 1, February 2000, pp. 16-29.
  • 35
    • 34250620027 scopus 로고    scopus 로고
    • H. Harney, C. Muckhenhirn, Group key management protocol (GKMP) Specification, RFC 2093, July 1997.
  • 36
    • 4444278670 scopus 로고    scopus 로고
    • Y.T. Hou, Y. Shi, H.D. Sherali, Rate allocation in wireless sensor networks with network lifetime requirement, in: Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Tokyo Japan, May 2004, pp. 67-77.
  • 37
    • 1542358975 scopus 로고    scopus 로고
    • J. Pan, Y.T. Hou, L. Cai, Y. Shi, S.X. Shen, Topology control for wireless sensor networks, in: Proceedings of ACM International Conference on Mobile Computing and Networking (Mobicom), San Diego CA, September 2003, pp. 286-299.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.