메뉴 건너뛰기




Volumn 4610 LNCS, Issue , 2007, Pages 441-448

Key establishment scheme for sensor networks with low communication cost

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; PUBLIC KEY CRYPTOGRAPHY; TELECOMMUNICATION NETWORKS;

EID: 38049019206     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73547-2_45     Document Type: Conference Paper
Times cited : (8)

References (21)
  • 3
    • 26444474509 scopus 로고    scopus 로고
    • Choi, K.Y., Hwang, J.Y., Lee, D.H.: ID-based Authenticated Key Agreement for Low-Power Mobile Devices. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 494-505. Springer, Heidelberg (2005)
    • Choi, K.Y., Hwang, J.Y., Lee, D.H.: ID-based Authenticated Key Agreement for Low-Power Mobile Devices. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 494-505. Springer, Heidelberg (2005)
  • 4
    • 8344262333 scopus 로고    scopus 로고
    • Du, W., Deng, J., Han, Y. S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM 04, pp. 586-597 (2004)
    • Du, W., Deng, J., Han, Y. S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM 04, pp. 586-597 (2004)
  • 6
    • 0038341106 scopus 로고    scopus 로고
    • Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM CCS 02, pp. 41-47 (2002)
    • Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM CCS 02, pp. 41-47 (2002)
  • 7
    • 23944459661 scopus 로고    scopus 로고
    • Gaubatz, G., Kaps, J., Sunar, B.: Public keys cryptography in sensor networks?revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, 3313, pp. 2-18. Springer, Heidelberg (2005)
    • Gaubatz, G., Kaps, J., Sunar, B.: Public keys cryptography in sensor networks?revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2-18. Springer, Heidelberg (2005)
  • 8
    • 35048818581 scopus 로고    scopus 로고
    • Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C: Comparing elliptic curve cryptography and RSA on 8-bit CPUS. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 119-132. Springer, Heidelberg (2004)
    • Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C: Comparing elliptic curve cryptography and RSA on 8-bit CPUS. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
  • 9
    • 1542286901 scopus 로고    scopus 로고
    • Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast authenticated key establishment protocols for self-organizing sensor networks. In: ACM WSNA 03, pp. 141-150 (2003)
    • Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast authenticated key establishment protocols for self-organizing sensor networks. In: ACM WSNA 03, pp. 141-150 (2003)
  • 10
    • 38049060925 scopus 로고    scopus 로고
    • IEEE Std. 802.15.4-2003, IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANS) (2003)
    • IEEE Std. 802.15.4-2003, IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANS) (2003)
  • 14
    • 20344381294 scopus 로고    scopus 로고
    • Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: IEEE SECON 04, pp. 71-80 (2004)
    • Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: IEEE SECON 04, pp. 71-80 (2004)
  • 16
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. of Cryptology 13, 361-396 (2000)
    • (2000) J. of Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 17
    • 38049038116 scopus 로고    scopus 로고
    • Wander, A., Gura, N., Eberle, H., Gupta, V., Chang, S.: Energy analysis for publickey cryptography for wireless sensor networks. In: IEEE PERCOM 05 (2005)
    • Wander, A., Gura, N., Eberle, H., Gupta, V., Chang, S.: Energy analysis for publickey cryptography for wireless sensor networks. In: IEEE PERCOM 05 (2005)
  • 18
    • 14844304757 scopus 로고    scopus 로고
    • Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: Securing sensor networks with public key technology. In: ACM SASN 04, pp. 59-64 (2004)
    • Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: Securing sensor networks with public key technology. In: ACM SASN 04, pp. 59-64 (2004)
  • 19
    • 24944483778 scopus 로고    scopus 로고
    • Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing sensor networks with location-based keys. In: IEEE WCNC 05, pp. 1909-1914 (2005)
    • Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing sensor networks with location-based keys. In: IEEE WCNC 05, pp. 1909-1914 (2005)
  • 20
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc
    • Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks 24(2), 47-260 (2006)
    • (2006) Networks , vol.24 , Issue.2 , pp. 47-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 21
    • 33947309703 scopus 로고    scopus 로고
    • Secure localization and authentication in ultra-wideband sensor networks. IEEE JSAC, Special Issue on UWB Wireless Communications
    • Zhang, Y., Liu, W., Lou, W., Fang, Y., Wu, D.: Secure localization and authentication in ultra-wideband sensor networks. IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications 24(4), 829-835 (2006)
    • (2006) Theory and Applications , vol.24 , Issue.4 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4    Wu, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.