메뉴 건너뛰기




Volumn 6, Issue 11, 2007, Pages 4136-4144

On broadcast authentication in wireless sensor networks

Author keywords

Broadcast authentication; Multisender security; Wireless sensor network

Indexed keywords

BROADCAST AUTHENTICATION; MERKLE HASH TREE; MULTISENDER SECURITY; QUANTITATIVE ENERGY CONSUMPTION;

EID: 36248988077     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2007.060255     Document Type: Article
Times cited : (159)

References (39)
  • 2
    • 5444275208 scopus 로고    scopus 로고
    • Wireless sensor and actor networks: Research challenges
    • I. Akyildiz and I. Kasimoglu, "Wireless sensor and actor networks: Research challenges," Ad Hoc Networks, vol. 2, no. 8, pp. 351-367, 2004.
    • (2004) Ad Hoc Networks , vol.2 , Issue.8 , pp. 351-367
    • Akyildiz, I.1    Kasimoglu, I.2
  • 3
    • 0032074435 scopus 로고    scopus 로고
    • Self-powered signal processing using vibration-based power generation
    • R. Amirtharajah and A. Chandrakasan, "Self-powered signal processing using vibration-based power generation," IEEE J. Solid-State Circuits, vol. 33, pp. 687-695, 1998.
    • (1998) IEEE J. Solid-State Circuits , vol.33 , pp. 687-695
    • Amirtharajah, R.1    Chandrakasan, A.2
  • 4
    • 33847003127 scopus 로고    scopus 로고
    • An high-speed ECC-based wireless authentication protocol on an ARM microprocessor
    • M. Aydos, T. Yanik, and C. Koc. "An high-speed ECC-based wireless authentication protocol on an ARM microprocessor," in Proc. 16th Computer Security Applications Conf., 2000, pp. 401-409.
    • (2000) Proc. 16th Computer Security Applications Conf , pp. 401-409
    • Aydos, M.1    Yanik, T.2    Koc, C.3
  • 5
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Proc. CRYPTO'02, Springer-Verlag
    • P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," in Proc. CRYPTO'02, Ser. LNCS, vol. 2442, pp. 354-368, Springer-Verlag, 2002.
    • (2002) Ser. LNCS , vol.2442 , pp. 354-368
    • Barreto, P.1    Kim, H.2    Bynn, B.3    Scott, M.4
  • 6
    • 35048900981 scopus 로고    scopus 로고
    • On the selection of pairing-friendly groups in selected areas in cryptography
    • Proc. SAC'03, Springer-Verlag
    • P. Barreto, B. Lynn, and M. Scott, "On the selection of pairing-friendly groups in selected areas in cryptography," in Proc. SAC'03, Ser: LNCS, vol. 3006, pp. 17-25, Springer-Verlag, 2004.
    • (2004) Ser: LNCS , vol.3006 , pp. 17-25
    • Barreto, P.1    Lynn, B.2    Scott, M.3
  • 7
    • 36248958414 scopus 로고    scopus 로고
    • G. Bertoni, L. Chen, P. Fragneto, K. Harrison, and G. Pelosil, Computing tate pairing on smartcards, White Paper, STMicroelectronics, 2005 [Online]. Available: http://www.st.com/stonline/ products/families/smartcard/astibe.htm
    • G. Bertoni, L. Chen, P. Fragneto, K. Harrison, and G. Pelosil, "Computing tate pairing on smartcards," White Paper, STMicroelectronics, 2005 [Online]. Available: http://www.st.com/stonline/ products/families/smartcard/astibe.htm
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identify-based encryption from the weil pairing
    • Proc. CRYPTO'01, Springer-Verlag
    • D. Boneh and M. Franklin, "Identify-based encryption from the weil pairing," in Proc. CRYPTO'01, Ser: LNCS, vol. 2139, pp. 213-229, Springer-Verlag, 2001.
    • (2001) Ser: LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 13244263673 scopus 로고    scopus 로고
    • Crossbow Technology Inc, Online, Available
    • Crossbow Technology Inc, "Wireless sensor network," 2004 [Online]. Available: http://www.xbow.com/
    • (2004) Wireless sensor network
  • 12
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Aug
    • F. Hess, "Efficient identity based signature schemes based on pairings," in Proc. SAC'02, Aug. 2002, pp. 310-324.
    • (2002) Proc. SAC'02 , pp. 310-324
    • Hess, F.1
  • 13
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A Defense against wormhole attacks in wireless ad hoc networks
    • Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A Defense against wormhole attacks in wireless ad hoc networks," in Proc. IEEE INFOCOM, 2003, pp. 1976-1986.
    • (2003) Proc. IEEE INFOCOM , pp. 1976-1986
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 15
    • 84858476334 scopus 로고    scopus 로고
    • Intel Corp, Online, Available
    • Intel Corp., "Intel mote 2 overview," [Online], Available: http://www.intel.com/research/downloads/imote\_overview.pdf
    • Intel mote 2 overview
  • 19
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
    • D. Liu and P. Ning, "Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks," in Proc. 10th Annual Network Distributed Syst. Security Symposium (NDSS'03), 2003, pp. 263-276.
    • (2003) Proc. 10th Annual Network Distributed Syst. Security Symposium (NDSS'03) , pp. 263-276
    • Liu, D.1    Ning, P.2
  • 20
    • 85000276942 scopus 로고    scopus 로고
    • D. Liu and P. Ning, Multi-level mTESLA: Broadcast authentication for distributed sensor networks, ACM Trans. Embedded Computing Systems (TECS), 3, no. 4, pp. 800-836, 2004.
    • D. Liu and P. Ning, "Multi-level mTESLA: Broadcast authentication for distributed sensor networks," ACM Trans. Embedded Computing Systems (TECS), vol. 3, no. 4, pp. 800-836, 2004.
  • 25
    • 0000758345 scopus 로고
    • Proposed Federal Information Processing Standard for Digital Signature Standard (DSS)
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology: Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register, vol. 56, no. 169, pp. 42980-42982, 1991.
    • (1991) Federal Register , vol.56 , Issue.169 , pp. 42980-42982
  • 28
    • 36248933437 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
    • (2006) Proc. IEEE INFOCOM , pp. 1-12
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 29
    • 33646834914 scopus 로고    scopus 로고
    • A new approach for random key pre-distribution in large scale wireless sensor networks
    • K. Ren, K. Zeng, and W Lou, "A new approach for random key pre-distribution in large scale wireless sensor networks," J. Wireless Commun. Mobile Computing (WCMC), vol. 6, no. 3, pp. 307-318, 2006.
    • (2006) J. Wireless Commun. Mobile Computing (WCMC) , vol.6 , Issue.3 , pp. 307-318
    • Ren, K.1    Zeng, K.2    Lou, W.3
  • 30
    • 33749667642 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • Proc. WASA 2006, Aug
    • K. Ren, K. Zeng, W. Lou, and P. Moran, "On broadcast authentication in wireless sensor networks," in Proc. WASA 2006, LNCS, Aug. 2006, vol. 4138, pp. 502-514,.
    • (2006) LNCS , vol.4138 , pp. 502-514
    • Ren, K.1    Zeng, K.2    Lou, W.3    Moran, P.4
  • 31
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp.120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 33
    • 33750710411 scopus 로고    scopus 로고
    • Implementing cryptographic pairings on smartcards
    • Proc. Cryptographic Hardware Embedded Syst.-CHES 2006: 8th International Workshop, Oct
    • M. Scott, N. Costigan, and W. Abdulwahab, "Implementing cryptographic pairings on smartcards," in Proc. Cryptographic Hardware Embedded Syst.-CHES 2006: 8th International Workshop, LNCS, Oct. 2006, vol. 4249, pp. 134-147.
    • (2006) LNCS , vol.4249 , pp. 134-147
    • Scott, M.1    Costigan, N.2    Abdulwahab, W.3
  • 34
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Proc. CRYPTO'84, Springer-Verlag
    • A. Shamir, "Identity based cryptosystems and signature schemes," in Proc. CRYPTO'84, Ser. LNCS, vol. 196, pp. 47-53, Springer-Verlag, 1984.
    • (1984) Ser. LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 37
    • 24944445896 scopus 로고    scopus 로고
    • Batch verifications with ID-based signatures
    • H. Yoon, J. Cheon, and Y. Kim, "Batch verifications with ID-based signatures," in Proc. ICISC 2004, Ser. LNCS, 2005, vol. 3506, pp. 233-248.
    • (2005) Proc. ICISC 2004, Ser. LNCS , vol.3506 , pp. 233-248
    • Yoon, H.1    Cheon, J.2    Kim, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.