메뉴 건너뛰기




Volumn , Issue , 2007, Pages 2503-2506

SASO: Security adaptive self-organization for wireless sensor networks

Author keywords

Clustering; Key management; Re keying process; Security; Session key derivation; Wireless sensor networks

Indexed keywords

AUTHENTICATION; CLUSTER ANALYSIS; COMPUTER NETWORKS; NETWORK SECURITY;

EID: 38049007380     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WICOM.2007.623     Document Type: Conference Paper
Times cited : (2)

References (14)
  • 1
    • 84883897746 scopus 로고    scopus 로고
    • gaurav jolly.Mustafa c.kuscu,pallavi kokate,and Mohamed younis,a low-energy key management protocol for wireless sensor networks, proceedings of eighth IEEE International symposium on computers and communication(ISCC03) IEEE 2003.
    • gaurav jolly.Mustafa c.kuscu,pallavi kokate,and Mohamed younis,"a low-energy key management protocol for wireless sensor networks, "proceedings of eighth IEEE International symposium on computers and communication(ISCC03) IEEE 2003.
  • 2
    • 0033357103 scopus 로고    scopus 로고
    • securing ad hoc networks
    • L.Zhou and Z.J.Haas,"securing ad hoc networks,"IEEE Network, vol. 13,no.6,pp.24-30,1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 3
    • 38049065209 scopus 로고    scopus 로고
    • kyung hyune khee,young ho park, and gene tsudik,an architecture for key management in hierarchical mobile ad-hoc networks,journal of communications and networks.6,no.2,june 2004.
    • kyung hyune khee,young ho park, and gene tsudik,"an architecture for key management in hierarchical mobile ad-hoc networks,"journal of communications and networks.vol.6,no.2,june 2004.
  • 4
    • 0035789267 scopus 로고    scopus 로고
    • S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proc. 2001 ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, pages 156-163. ACM Press, October 2001. ISBN 1-58113-428-2.
    • S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proc. 2001 ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, pages 156-163. ACM Press, October 2001. ISBN 1-58113-428-2.
  • 6
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer and V.D. Gligor. A key-management scheme for distributed sensor networks. In Proc. 9th ACM conference on Computer and communications security, pages 41-47. ACM Press, 2002. ISBN 1-58113-612-9.
    • L. Eschenauer and V.D. Gligor. A key-management scheme for distributed sensor networks. In Proc. 9th ACM conference on Computer and communications security, pages 41-47. ACM Press, 2002. ISBN 1-58113-612-9.
  • 10
    • 0033877788 scopus 로고    scopus 로고
    • Wendi Rabiner Heinzelman, Anantha Chandrakasan and Hari Balakrishnan. Hawaaian Energy-Efficient Communication Protocols for Wireless Microsensor Networks (LEACH). Int'l Conf. on Systems Science, January 2000.
    • Wendi Rabiner Heinzelman, Anantha Chandrakasan and Hari Balakrishnan. Hawaaian "Energy-Efficient Communication Protocols for Wireless Microsensor Networks (LEACH)". Int'l Conf. on Systems Science, January 2000.
  • 11
    • 17944374430 scopus 로고    scopus 로고
    • A non-interactive protocol for member expansion in a secret sharing scheme
    • Dong P,Kuang xh,Lu XC,"A non-interactive protocol for member expansion in a secret sharing scheme,"Journal of software,2005,16(1):116- 120. http://www.ios.org.cn/1000-9825/16/116.htm
    • (2005) Journal of software , vol.16 , Issue.1 , pp. 116-120
    • Dong, P.1    Kuang xh, L.X.2
  • 12
    • 38049013520 scopus 로고    scopus 로고
    • FIPS 180-1. Secure Hash Standard (SHS), April 1995.
    • FIPS 180-1. Secure Hash Standard (SHS), April 1995.
  • 13
    • 38049083266 scopus 로고    scopus 로고
    • FIPS 180-2. Secure Hash Standard (SHS), August 2002.
    • FIPS 180-2. Secure Hash Standard (SHS), August 2002.
  • 14
    • 84937436045 scopus 로고    scopus 로고
    • Increasing the lifetime of a key: A comparitive analysis of the security of rekeying techniques
    • T. Okamoto, editor, Advances in Cryptology, ASIACRYPT 2000, of
    • M. Abdalla and M. Bellare. Increasing the lifetime of a key: A comparitive analysis of the security of rekeying techniques. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of LNCS, pages 546-565.
    • LNCS , vol.1976 , pp. 546-565
    • Abdalla, M.1    Bellare, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.