메뉴 건너뛰기




Volumn 30, Issue 11-12, 2007, Pages 2314-2341

A survey of key management schemes in wireless sensor networks

Author keywords

Key management; Security; Wireless sensor network

Indexed keywords

DATA STORAGE EQUIPMENT; PROBLEM SOLVING; SECURITY OF DATA;

EID: 34548038583     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.04.009     Document Type: Article
Times cited : (578)

References (34)
  • 1
    • 34548050722 scopus 로고    scopus 로고
    • L. Eschenauer, V.D. Gligor, A key management scheme for distributed sensor networks, in: Proceedings of the 9th ACM Conference on Computer and Communication Security.
  • 2
    • 28444433009 scopus 로고    scopus 로고
    • H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 11-14, pp. 197- 213.
  • 5
    • 0034771605 scopus 로고    scopus 로고
    • SPINS: security protocols for sensor networks
    • Perrig A., et al. SPINS: security protocols for sensor networks. Proceedings of ACM MOBICOM (2001)
    • (2001) Proceedings of ACM MOBICOM
    • Perrig, A.1
  • 6
    • 10044284351 scopus 로고    scopus 로고
    • S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: Proceedings of The 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., October, 2003.
  • 7
    • 34548025882 scopus 로고    scopus 로고
    • D. Carman, P. Kruus, B. Matt, Constraints and approaches for distributed sensor network security, NAI Labs Technical Report No. 00-010, September 2000.
  • 8
    • 8344262333 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Proceedings of IEEE INFOCOM 2004.
  • 9
    • 0017959977 scopus 로고
    • Secure communication over insecure channels
    • Merkle R. Secure communication over insecure channels. Communications of the ACM 21 4 (1978) 294-299
    • (1978) Communications of the ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.1
  • 10
    • 34548013797 scopus 로고    scopus 로고
    • R. Anderson, A. Perrig, Key infection: smart trust for smart dust, Unpublished Manuscript, November 2001.
  • 14
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood A.D., and Stankovic J.A. Denial of service in sensor networks. Computer 35 10 (2002) 54-62
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 16
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route detection and filtering of injected false data in sensor networks
    • Ye F., Luo H., Lu S., and Zhang L. Statistical en-route detection and filtering of injected false data in sensor networks. Proceedings of IEEE INFOCOM (2004)
    • (2004) Proceedings of IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 18
    • 34548047041 scopus 로고    scopus 로고
    • M. Chen, W. Cui, V. Wen, A. Woo, Security and Deployment Issues in a Sensor Network, Ninja Project, A Scalable Internet ServicesArchitecture, Berkeley.
  • 19
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach
    • Zhang W., and Cao G. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. Proceedings of INFOCOM (2005)
    • (2005) Proceedings of INFOCOM
    • Zhang, W.1    Cao, G.2
  • 23
    • 0041939724 scopus 로고    scopus 로고
    • S. Shakkottai, R. Srikant, N. Shroff, Unreliable sensor grids: coverage, connectivity and diameter, in: Proceedings of the IEEE INFOCOM, 2003, pp. 1073-1083.
  • 24
    • 33750023217 scopus 로고    scopus 로고
    • X. Du, Y. Xiao, M. Guizani, H.H. Chen, An Effective Key Management Scheme for Heterogeneous Sensor Networks, Ad Hoc Networks, Elsevier, vol. 5, issue 1, January 2007, pp. 24-34.
  • 25
    • 34548038437 scopus 로고    scopus 로고
    • X. Du, M. Guizani, Y. Xiao, S. Ci, H.H. Chen, A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, in: IEEE Transactions on Wireless Communications, accepted for publication (to appear).
  • 26
    • 20344381294 scopus 로고    scopus 로고
    • D. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: Proceedings of 1st IEEE International Conference Communications and Networks (SECON), Santa Clara, CA, October 2004.
  • 27
    • 34548031429 scopus 로고    scopus 로고
    • N. Gura, A. Patel, A. Wander, H. Eberle, S.C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, in: Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, Boston, Massachusetts, August 2004.
  • 28
    • 33646581008 scopus 로고    scopus 로고
    • A.S. Wander, N. Gura, H. Eberle et al., Energy analysis of public-key cryptography for wireless sensor networks, in: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PERCOM), 2005.
  • 29
    • 33748959977 scopus 로고    scopus 로고
    • P. Traynor, H. Choi, G. Cao, S. Zhu, T. Porta, Establishing pair-wise keys in heterogeneous sensor networks, in: Proceedings of IEEE INFOCOM 06.
  • 32
    • 34548041679 scopus 로고    scopus 로고
    • F. Anjum, Location dependent key management using random key-predistribution in sensor networks, in: Proceedings of WiSe'06.
  • 34
    • 34548015902 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y. Han, P.K. Varshney, A pairwise key predistribution scheme for wireless sensor networks, in: Proceedings of CCS'03.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.