메뉴 건너뛰기




Volumn 3, Issue 3, 2007, Pages

Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach

Author keywords

Insider attack; Node fabrication; Selective node capture; Sensor

Indexed keywords

COMPUTER CRIME; ROBUSTNESS (CONTROL SYSTEMS); WIRELESS SENSOR NETWORKS;

EID: 34548396246     PISSN: 15504859     EISSN: 15504867     Source Type: Journal    
DOI: 10.1145/1267060.1267064     Document Type: Article
Times cited : (24)

References (37)
  • 2
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • Proceedings of EUROCRYPT'84, Springer-Verlag, Berlin, Germany
    • BLOM, R. 1985. An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT'84. Lecture Notes in Computer Science, vol. 209. Springer-Verlag, Berlin, Germany, 335-338.
    • (1985) Lecture Notes in Computer Science , vol.209 , pp. 335-338
    • BLOM, R.1
  • 3
    • 0005908666 scopus 로고    scopus 로고
    • BLUNDO, C., SANTIS, A. D., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1998. Perfectly-secure key distribution for dynamic conferences. Inform. Computat. 146, 1, 1-23.
    • BLUNDO, C., SANTIS, A. D., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1998. Perfectly-secure key distribution for dynamic conferences. Inform. Computat. 146, 1, 1-23.
  • 4
    • 28444433009 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • IEEE Computer Society Press, Los Alamitos, CA
    • CHAN, H., PERRIG, A., AND SONG, D. 2003. Random key predistribution schemes for sensor networks. In Proceedings of the 2003 Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 197-215.
    • (2003) Proceedings of the 2003 Symposium on Security and Privacy , pp. 197-215
    • CHAN, H.1    PERRIG, A.2    SONG, D.3
  • 5
    • 12444300139 scopus 로고    scopus 로고
    • DI PIETRO, R., MANCINI, L. V., AND MEI, A. 2004. Efficient and resilient key discovery based on pseudo-random key pre-deployment. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS). 217.
    • DI PIETRO, R., MANCINI, L. V., AND MEI, A. 2004. Efficient and resilient key discovery based on pseudo-random key pre-deployment. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS). 217.
  • 10
    • 33744548460 scopus 로고    scopus 로고
    • LAD: Localization anomaly detection for wireless sensor networks
    • DU, W., FANG, L., AND NING, P. 2006. LAD: Localization anomaly detection for wireless sensor networks. J. Parall. Distrib. Comput. 66, 7, 874-886.
    • (2006) J. Parall. Distrib. Comput. 66 , vol.7 , pp. 874-886
    • DU, W.1    FANG, L.2    NING, P.3
  • 12
    • 0013043106 scopus 로고    scopus 로고
    • Highly-resilient, energy-efficient multipath routing in wireless sensor networks
    • GANESAN, D., GOVINDAN, R., SHENKER, S., AND ESTRIN, D. 2001. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. Mobile Comput. Commun. Rev. 4, 5, 11-25.
    • (2001) Mobile Comput. Commun. Rev , vol.4 , Issue.5 , pp. 11-25
    • GANESAN, D.1    GOVINDAN, R.2    SHENKER, S.3    ESTRIN, D.4
  • 17
    • 34548391593 scopus 로고    scopus 로고
    • Modeling pairwise key establishment for random key predistribution in large-scale sensor networks
    • In Press
    • HUANG, D., MEHTA, M., VAN DE LIEFVOORT, A., AND MEDHI, D. 2007. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks. IEEE/ACM Trans. Netw. In Press.
    • (2007) IEEE/ACM Trans. Netw
    • HUANG, D.1    MEHTA, M.2    VAN DE LIEFVOORT, A.3    MEDHI, D.4
  • 19
    • 2942656255 scopus 로고    scopus 로고
    • KARLOP, C. AND WAGNER, D. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Netw. J. (Special issue on Sensor Network Applications and Protocols) 1, 2-3 (Sept.), 293-315.
    • KARLOP, C. AND WAGNER, D. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Netw. J. (Special issue on Sensor Network Applications and Protocols) 1, 2-3 (Sept.), 293-315.
  • 20
    • 0003683288 scopus 로고
    • High-speed RSA implementation
    • Tech. rep. 201, RSA Laboratories, Bedford, MA
    • KOÇ, C. K. 1994. High-speed RSA implementation. Tech. rep. 201, RSA Laboratories, Bedford, MA.
    • (1994)
    • KOÇ, C.K.1
  • 24
    • 84866860550 scopus 로고    scopus 로고
    • LIU, D. AND NING, P. 2005. Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Trans. Sens. Netw. 1, 2(Nov.) 204-239.
    • LIU, D. AND NING, P. 2005. Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Trans. Sens. Netw. 1, 2(Nov.) 204-239.
  • 27
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • LIU, D., NING, P., AND LI, R. 2005C. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Sec. 8, 1, 41-77.
    • (2005) ACM Trans. Inform. Syst. Sec. 8 , vol.1 , pp. 41-77
    • LIU, D.1    NING, P.2    LI, R.3
  • 31
    • 0345851235 scopus 로고    scopus 로고
    • Wireless integrated network sensors
    • May
    • POTTIE, G. J. AND KAISER, W. J. 2000. Wireless integrated network sensors. Commun. ACM 43, 5 (May), 51 - 58.
    • (2000) Commun. ACM , vol.43 , Issue.5 , pp. 51-58
    • POTTIE, G.J.1    KAISER, W.J.2
  • 32
    • 0001174154 scopus 로고
    • Polynomial codes over certain finite fields
    • REED, I. S. AND SOLOMON, G. 1960. Polynomial codes over certain finite fields. SIAM J. Appl. Math 8, 300-304.
    • (1960) SIAM J. Appl. Math , vol.8 , pp. 300-304
    • REED, I.S.1    SOLOMON, G.2
  • 33
    • 0017512185 scopus 로고
    • On the complexity of decoding goppa codes
    • SARWATE, D. V. 1977. On the complexity of decoding goppa codes. IEEE Trans. Inform. Theor. 23, 4, 515-516.
    • (1977) IEEE Trans. Inform. Theor , vol.23 , Issue.4 , pp. 515-516
    • SARWATE, D.V.1
  • 35
    • 2342588224 scopus 로고    scopus 로고
    • Analysis of multipath routing part I: The effect on the packet delivery ratio
    • TSIRIGOS, A. AND HAAS, Z. J. 2004. Analysis of multipath routing part I: The effect on the packet delivery ratio. IEEE Trans. Wireless Commun. 3, 1, 138-146.
    • (2004) IEEE Trans. Wireless Commun , vol.3 , Issue.1 , pp. 138-146
    • TSIRIGOS, A.1    HAAS, Z.J.2
  • 37
    • 84943553152 scopus 로고    scopus 로고
    • ZHU, S., XU, S., SETIA, S., AND JAJODIA, S. 2003. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP). 326-335.
    • ZHU, S., XU, S., SETIA, S., AND JAJODIA, S. 2003. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP). 326-335.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.