메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Energy efficient group key management scheme for wireless sensor networks (invited paper)

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL SYSTEM ANALYSIS; HIERARCHICAL SYSTEMS; SECURITY OF DATA; TOPOLOGY; TREES (MATHEMATICS);

EID: 34748821707     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMSWA.2007.382603     Document Type: Conference Paper
Times cited : (13)

References (27)
  • 4
    • 33749525209 scopus 로고    scopus 로고
    • Efficient aggregation of encrypted data in wireless sensor networks
    • IEEE Computer Society
    • C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient aggregation of encrypted data in wireless sensor networks," in MobiQuitous. IEEE Computer Society, 2005, pp. 109-117.
    • (2005) MobiQuitous , pp. 109-117
    • Castelluccia, C.1    Mykletun, E.2    Tsudik, G.3
  • 6
    • 4644277168 scopus 로고    scopus 로고
    • Routing for maximum system lifetime in wireless ad-hoc networks
    • J.-H. Chang and L. Tassiulas, "Routing for maximum system lifetime in wireless ad-hoc networks," in Allerton Conference, 1999.
    • (1999) Allerton Conference
    • Chang, J.-H.1    Tassiulas, L.2
  • 7
    • 0033885342 scopus 로고    scopus 로고
    • Energy conserving routing in wireless ad-hoc networks
    • _, "Energy conserving routing in wireless ad-hoc networks," in IEEE INFOCOM, 2000, pp. 22-31.
    • (2000) IEEE INFOCOM , pp. 22-31
    • Chang, J.-H.1    Tassiulas, L.2
  • 9
    • 34748926616 scopus 로고    scopus 로고
    • Crossbow technology inc, Online, Available
    • Crossbow technology inc. [Online]. Available: http://www.xbow.com/
  • 11
    • 0031120164 scopus 로고    scopus 로고
    • Multipoint communication: A survey of protocols, functions, and mechanisms
    • C. Diot, W. Dabbous, and J. Crowcroft, "Multipoint communication: A survey of protocols, functions, and mechanisms," IEEE Journal on Selected Areas in Communications, vol. 15, no. 3, pp. 277-290, 1997.
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.3 , pp. 277-290
    • Diot, C.1    Dabbous, W.2    Crowcroft, J.3
  • 16
    • 25844467827 scopus 로고    scopus 로고
    • Maximum lifetime broadcasting in wireless networks
    • J. Park and S. Sahni, "Maximum lifetime broadcasting in wireless networks," IEEE Transactions on Computers, vol. 54, pp. 1081-1090, 2005.
    • (2005) IEEE Transactions on Computers , vol.54 , pp. 1081-1090
    • Park, J.1    Sahni, S.2
  • 20
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • September
    • S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, pp. 303-329, September 2003.
    • (2003) ACM Computing Surveys , vol.35 , pp. 303-329
    • Rafaeli, S.1    Hutchison, D.2
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. A. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.A.3
  • 22
    • 34748924701 scopus 로고    scopus 로고
    • Authenticated flooding in large-scale sensor networks
    • November
    • J.-H. Son, H. Luo, and S.-W. Seo, "Authenticated flooding in large-scale sensor networks." in IEEE MASS, November 2005.
    • (2005) IEEE MASS
    • Son, J.-H.1    Luo, H.2    Seo, S.-W.3
  • 24
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
    • D. Westhoff, J. Girão, and M. Acharya, "Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation," IEEE Transactions on Mobile Computing, vol. 5, no. 10, pp. 1417-1431, 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girão, J.2    Acharya, M.3
  • 25
    • 0036920297 scopus 로고    scopus 로고
    • Energy- efficient broadcast and multicast trees in wireless networks
    • J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, "Energy- efficient broadcast and multicast trees in wireless networks," Mobile Networks and Applications, vol. 7, no. 6, pp. 481-492, 2002.
    • (2002) Mobile Networks and Applications , vol.7 , Issue.6 , pp. 481-492
    • Wieselthier, J.E.1    Nguyen, G.D.2    Ephremides, A.3
  • 26
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs," in SIGCOMM, 1998, pp. 68-79.
    • (1998) SIGCOMM , pp. 68-79
    • Wong, C.K.1    Gouda, M.G.2    Lam, S.S.3
  • 27
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
    • IEEE
    • W. Zhang and G. Cao, "Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach," in INFOCOM. IEEE, 2005, pp. 503-514.
    • (2005) INFOCOM , pp. 503-514
    • Zhang, W.1    Cao, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.