메뉴 건너뛰기




Volumn , Issue , 2007, Pages 3419-3424

Group rekeying schemes for secure group communication in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; COMPUTATIONAL METHODS; SECURITY OF DATA;

EID: 38549140749     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2007.566     Document Type: Conference Paper
Times cited : (21)

References (22)
  • 1
    • 4544285741 scopus 로고    scopus 로고
    • Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach
    • Hongkong
    • O. Younis and S. Fahmy, "Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach," in Proceedings of IEEE INFOCOM, Hongkong, 2004, pp. 629-640.
    • (2004) Proceedings of IEEE INFOCOM , pp. 629-640
    • Younis, O.1    Fahmy, S.2
  • 6
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • Hongkong
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," in Proceedings of IEEE INFOCOM, Hongkong, 2004.
    • (2004) Proceedings of IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 7
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • Oakland, CA, USA, May
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," in Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2004, pp. 259-271.
    • (2004) Proceedings of IEEE Symposium on Security and Privacy , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 9
    • 14344254253 scopus 로고    scopus 로고
    • A secure hierarchical model for sensor network
    • M. Tubaishat, J. Yin, B. Panja, and S. Madria, "A secure hierarchical model for sensor network," SIGMOD Rec., vol. 33, no. 1, pp. 7-13, 2004.
    • (2004) SIGMOD Rec , vol.33 , Issue.1 , pp. 7-13
    • Tubaishat, M.1    Yin, J.2    Panja, B.3    Madria, S.4
  • 10
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16-30, 2000.
    • (2000) IEEE/ACM Trans. Netw , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 15
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
    • Miami, March 13-17
    • W. Zhang and G. Cao, "Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach," in Proceedings of IEEE INFOCOM, Miami, March 13-17 2005.
    • (2005) Proceedings of IEEE INFOCOM
    • Zhang, W.1    Cao, G.2
  • 22
    • 38549178457 scopus 로고    scopus 로고
    • Y. Wang and B. Ramamurthy, SENSIM: SEnsor Network SIMulator Version 0.1, August 2006, Online, Available
    • Y. Wang and B. Ramamurthy, "SENSIM: SEnsor Network SIMulator (Version 0.1)," August 2006. [Online]. Available: http://cse.unl.edu/ ~ywang/sensim.htm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.