메뉴 건너뛰기




Volumn , Issue , 2007, Pages 90-99

A random perturbation-based scheme for pairwise key establishment in sensor networks

Author keywords

Pairwise key establishment; Polynomial; Random perturbation; Sensor network security

Indexed keywords

COMPUTATIONAL METHODS; PERTURBATION TECHNIQUES; POLYNOMIALS; RANDOM PROCESSES; SECURITY OF DATA; TOPOLOGY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 37849028668     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1288107.1288120     Document Type: Conference Paper
Times cited : (70)

References (30)
  • 13
    • 84858514690 scopus 로고    scopus 로고
    • Cotsbots: The mobile mote-based robots
    • "Cotsbots: The mobile mote-based robots," http://www-bsac.eecs. berkeley.edu/projects/cotsbots/.
  • 15
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • March
    • W. Du, J. Deng, Y. Han, and S. Chen, "A key management scheme for wireless sensor networks using deployment knowledge," IEEE INFOCOM'04, March 2004.
    • (2004) IEEE INFOCOM'04
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4
  • 17
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • Mar
    • Haowen Chan and Adrian Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proceedings of IEEE Infocom, Mar. 2005.
    • (2005) Proceedings of IEEE Infocom
    • Chan, H.1    Perrig, A.2
  • 24
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
    • March
    • W. Zhang and G. Cao, "Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach," IEEE Infocom 2005, March 2005.
    • (2005) IEEE Infocom 2005
    • Zhang, W.1    Cao, G.2
  • 25
    • 37849024577 scopus 로고    scopus 로고
    • Crossbow technology inc
    • "Crossbow technology inc," http://www.xbow.com 2004.
    • (2004)
  • 27
    • 37849024024 scopus 로고    scopus 로고
    • C. Karlof, N. Sastry, U. Shankar, and D. Wagner, Tinysec: Tinyos link layer security proposal, version 1.0, 2002
    • C. Karlof, N. Sastry, U. Shankar, and D. Wagner, "Tinysec: Tinyos link layer security proposal, version 1.0," 2002.
  • 28
    • 37849030698 scopus 로고
    • XOR MACs: New Methods for Message Authentication Using Finite Pseudo-random Functions
    • M. Bellare, R. Guerin, and P. Rogaway, "XOR MACs: New Methods for Message Authentication Using Finite Pseudo-random Functions.," Proc. of Crypto, 1995.
    • (1995) Proc. of Crypto
    • Bellare, M.1    Guerin, R.2    Rogaway, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.