메뉴 건너뛰기




Volumn , Issue , 2007, Pages 210-219

A hierarchical key establishment scheme for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTER SIMULATION; HIERARCHICAL SYSTEMS; RANDOM PROCESSES;

EID: 34548720911     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2007.14     Document Type: Conference Paper
Times cited : (42)

References (36)
  • 1
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • May
    • M. J. Beller and Y. Yacobi. Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics Letters, 29(11):999-1001, May 1993.
    • (1993) Electronics Letters , vol.29 , Issue.11 , pp. 999-1001
    • Beller, M.J.1    Yacobi, Y.2
  • 2
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • R. Blom. An optimal class of symmetric key generation systems. In Proc. of EuroCrypt '84, pages 335-338, 1984.
    • (1984) Proc. of EuroCrypt '84 , pp. 335-338
    • Blom, R.1
  • 4
    • 1542317846 scopus 로고    scopus 로고
    • An authentication framework for hierarchical ad hoc sensor networks
    • San Diego, CA, Sep
    • M. Bohge and W. Trappe. An authentication framework for hierarchical ad hoc sensor networks. In Proc. of WiSE '03, pages 79-87, San Diego, CA, Sep. 2003.
    • (2003) Proc. of WiSE '03 , pp. 79-87
    • Bohge, M.1    Trappe, W.2
  • 5
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security. TR No. 00-010, NAI Labs, Glenwood, MD
    • Sep
    • D. Carman, P. Kruus, and B. Matt. Constraints and approaches for distributed sensor network security. TR No. 00-010, NAI Labs, Glenwood, MD, Sep. 2000.
    • (2000)
    • Carman, D.1    Kruus, P.2    Matt, B.3
  • 6
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • Miami, FL, March
    • H. Chan and A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks. In Proc. of INFOCOM 2005, volume 1, pages 524-535, Miami, FL, March 2005.
    • (2005) Proc. of INFOCOM 2005 , vol.1 , pp. 524-535
    • Chan, H.1    Perrig, A.2
  • 7
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, CA, May
    • H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proc. of IEEE SSP, pages 197-213, Berkeley, CA, May 2003.
    • (2003) Proc. of IEEE SSP , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 8
    • 34548796607 scopus 로고    scopus 로고
    • Crossbow. MPR/MIB Users Manual. Crossbow Technology, Inc., San José, CA, USA, A edition, Sep. 2005.
    • Crossbow. MPR/MIB Users Manual. Crossbow Technology, Inc., San José, CA, USA, A edition, Sep. 2005.
  • 9
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • Hong Kong, PR China, Mar
    • W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proc. of INFOCOM '04, volume 1, pages 586-597, Hong Kong, PR China, Mar. 2004.
    • (2004) Proc. of INFOCOM '04 , vol.1 , pp. 586-597
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4    Varshney, P.5
  • 10
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key predistribution scheme for wireless sensor networks
    • Washington, D.C, USA, Oct
    • W. Du, J. Deng, Y. Han, and P. Varshney. A pairwise key predistribution scheme for wireless sensor networks. In Proc. of CCS '03, pages 42-51, Washington, D.C., USA, Oct. 2003.
    • (2003) Proc. of CCS '03 , pp. 42-51
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 11
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • Washington, DC, USA, Nov
    • L. Eschenauer and V. Gligor. A key-management scheme for distributed sensor networks. In Proc. of CCS '02, pages 41-47, Washington, DC, USA, Nov. 2002.
    • (2002) Proc. of CCS '02 , pp. 41-47
    • Eschenauer, L.1    Gligor, V.2
  • 13
    • 0033877788 scopus 로고    scopus 로고
    • Energy-efficient communication protocol for wireless microsensor networks
    • Maui, Hawaii, USA, Jan
    • W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In Proc. of HICSS '00, volume 2, page 10, Maui, Hawaii, USA, Jan. 2000.
    • (2000) Proc. of HICSS '00 , vol.2 , pp. 10
    • Heinzelman, W.1    Chandrakasan, A.2    Balakrishnan, H.3
  • 14
    • 14844314204 scopus 로고    scopus 로고
    • Location-aware key management scheme for wireless sensor networks
    • Washington DC, USA, Oct
    • D. Huang, M. Mehta, D. Medhi, and L. Harn. Location-aware key management scheme for wireless sensor networks. In Proc. of SASN '04, pages 29-42, Washington DC, USA, Oct. 2004.
    • (2004) Proc. of SASN '04 , pp. 29-42
    • Huang, D.1    Mehta, M.2    Medhi, D.3    Harn, L.4
  • 15
    • 24944463915 scopus 로고    scopus 로고
    • Cluster-based routing in wireless sensor networks: Issues and challenges
    • San José, CA, July
    • J. Ibriq and I. Mahgoub. Cluster-based routing in wireless sensor networks: Issues and challenges. In Proc. of SPECTS '04, pages 759-766, San José, CA, July 2004.
    • (2004) Proc. of SPECTS '04 , pp. 759-766
    • Ibriq, J.1    Mahgoub, I.2
  • 16
    • 33745933645 scopus 로고    scopus 로고
    • A key predistribution scheme for secure sensor networks using probability density function of node deployment
    • Alexandria, VA, Nov
    • T. Ito, H. Ohta, N. Matsuda, and T. Yoneda. A key predistribution scheme for secure sensor networks using probability density function of node deployment. In Proc. of SASN '05, pages 69-75, Alexandria, VA, Nov. 2005.
    • (2005) Proc. of SASN '05 , pp. 69-75
    • Ito, T.1    Ohta, H.2    Matsuda, N.3    Yoneda, T.4
  • 17
    • 84942426861 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Anchorage, Alaska, May
    • C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proc. of SNPA '03, pages 113-127, Anchorage, Alaska, May 2003.
    • (2003) Proc. of SNPA '03 , pp. 113-127
    • Karlof, C.1    Wagner, D.2
  • 18
    • 38949180258 scopus 로고    scopus 로고
    • Scalable session key construction protocol for wireless sensor networks
    • Austin, TX, USA, Dec
    • B. Lai, S. Kim, and I. Verbauwhede. Scalable session key construction protocol for wireless sensor networks. In IEEE Workshop on LARTES '02, Austin, TX, USA, Dec. 2002.
    • (2002) IEEE Workshop on LARTES '02
    • Lai, B.1    Kim, S.2    Verbauwhede, I.3
  • 19
    • 24144503356 scopus 로고    scopus 로고
    • Deterministic key predistribution schemes for distributed sensor networks
    • Waterloo, Canada, Aug
    • J. Lee and D. R. Stinson. Deterministic key predistribution schemes for distributed sensor networks. In Proc. of SAC '04, pages 294-307, Waterloo, Canada, Aug. 2004.
    • (2004) Proc. of SAC '04 , pp. 294-307
    • Lee, J.1    Stinson, D.R.2
  • 20
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
    • San Diago, CA, USA, Feb
    • D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proc. of the 10th NDSSS, San Diago, CA, USA, Feb. 2003.
    • (2003) Proc. of the 10th NDSSS
    • Liu, D.1    Ning, P.2
  • 21
    • 4544293215 scopus 로고    scopus 로고
    • Location-based pairwise key establishments for static sensor networks
    • Fairfax, VA, USA, Oct
    • D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In Proc. of SASN '03, pages 72-82, Fairfax, VA, USA, Oct. 2003.
    • (2003) Proc. of SASN '03 , pp. 72-82
    • Liu, D.1    Ning, P.2
  • 22
    • 33749033368 scopus 로고    scopus 로고
    • Group-based key predistribution in wireless sensor networks
    • Cologne, Germany, Sep
    • D. Liu, P. Ning, and W. Du. Group-based key predistribution in wireless sensor networks. In Proc. of WiSe '05, pages 11-20, Cologne, Germany, Sep. 2005.
    • (2005) Proc. of WiSe '05 , pp. 11-20
    • Liu, D.1    Ning, P.2    Du, W.3
  • 24
    • 34548809242 scopus 로고    scopus 로고
    • I. Mahgoub and M. Ilyas, editors, CRC Press, Boca Raton, FL
    • I. Mahgoub and M. Ilyas, editors. Sensor Network Protocols. CRC Press, Boca Raton, FL, 2006.
    • (2006) Sensor Network Protocols
  • 26
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Comm. of the ACM, 21(12):993-999, Dec. 1978.
    • (1978) Comm. of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 27
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sep
    • B. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33-38, Sep. 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Ts'o, T.2
  • 28
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • Jan
    • D. Otway and O. Rees. Efficient and timely mutual authentication. Operating Systems Review, 21(1):8-10, Jan. 1987.
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 29
    • 85016596484 scopus 로고    scopus 로고
    • LiSP: A lightweight security protocol for wireless sensor networks
    • Aug
    • T. Park and K. Shin. LiSP: A lightweight security protocol for wireless sensor networks. Transactions on Embedded Computing Systems (TECS), 3(3):634-660, Aug. 2004.
    • (2004) Transactions on Embedded Computing Systems (TECS) , vol.3 , Issue.3 , pp. 634-660
    • Park, T.1    Shin, K.2
  • 32
    • 34548790227 scopus 로고    scopus 로고
    • Secure hash standard. Technical Report, TR No. FIPS PUBS 180-2, National Institute of Standards and Technology, Springfield, VA
    • August
    • F. PUBS. Secure hash standard. Technical Report, TR No. FIPS PUBS 180-2, National Institute of Standards and Technology, Springfield, VA, August 2002.
    • (2002)
    • PUBS, F.1
  • 34
    • 14844304757 scopus 로고    scopus 로고
    • TinyPK: Securing sensor networks with public key technology
    • Washington, DC, USA, Oct
    • R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus. TinyPK: Securing sensor networks with public key technology. In Proc. of SASN '04, pages 59-64, Washington, DC, USA, Oct. 2004.
    • (2004) Proc. of SASN '04 , pp. 59-64
    • Watro, R.1    Kong, D.2    Cuti, S.3    Gardiner, C.4    Lynn, C.5    Kruus, P.6
  • 35
    • 33646400365 scopus 로고    scopus 로고
    • Efficient key establishment for group-based wireless sensor deployments
    • Sep
    • L. Zhou, J. Ni, and C. Ravishankar. Efficient key establishment for group-based wireless sensor deployments. In Proc. of WiSe '05, pages 1-10, Sep. 2005.
    • (2005) Proc. of WiSe '05 , pp. 1-10
    • Zhou, L.1    Ni, J.2    Ravishankar, C.3
  • 36
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Washington, DC, USA, Oct
    • S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proc. of ACM CCS '03, pages 62-72, Washington, DC, USA, Oct. 2003.
    • (2003) Proc. of ACM CCS '03 , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.