메뉴 건너뛰기




Volumn , Issue , 2006, Pages 437-443

A tamper-resistance key pre-distribution scheme for wireless sensor networks

Author keywords

Clustering network architecture; Key management; Trusted computing; Ubiquitous pervasive computing; Wireless sensor network

Indexed keywords

DATA PROCESSING; NETWORK ARCHITECTURE; UBIQUITOUS COMPUTING;

EID: 38649136938     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GCCW.2006.13     Document Type: Conference Paper
Times cited : (4)

References (20)
  • 1
    • 0001853125 scopus 로고
    • The Computer for the 21st Century
    • Weiser, M.: The Computer for the 21st Century. Scientific American, 265(3), (1991) 94-104
    • (1991) Scientific American , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 2
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey. Computer Networks, Elsevier
    • Akyildiz, I. F., Su, W., Sankarasubrarnanian, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks, Elsevier Science, 38(4), (2002) 393-422
    • (2002) Science , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubrarnanian, Y.3    Cayirci, E.4
  • 3
    • 38649137483 scopus 로고    scopus 로고
    • Tilak, S., Abu-Ghazaleh, N., Heinzelman, W.: A Taxonomy of Wireless Micro-sensor Network Models. ACM Mobile Computing and Communications Review (MC2R 2002), 6(2), (2002) 28-36
    • Tilak, S., Abu-Ghazaleh, N., Heinzelman, W.: A Taxonomy of Wireless Micro-sensor Network Models. ACM Mobile Computing and Communications Review (MC2R 2002), 6(2), (2002) 28-36
  • 4
    • 17644388294 scopus 로고    scopus 로고
    • Trusted computing platforms, the next security solution
    • Technical Report HPL-2002-221, HP Laboratories
    • Pearson, S.: Trusted computing platforms, the next security solution. Technical Report HPL-2002-221, HP Laboratories (2002)
    • (2002)
    • Pearson, S.1
  • 7
    • 39049083533 scopus 로고    scopus 로고
    • Delgosha, F., Fekri, F.: Threshold key-establishment in distributed sensor networks using a multivariate scheme. Accepted for presentation at INFOCOM 2006, http://users.ece.gatech.edu/~farshid/infocom06.pdf (2006)
    • Delgosha, F., Fekri, F.: Threshold key-establishment in distributed sensor networks using a multivariate scheme. Accepted for presentation at INFOCOM 2006, http://users.ece.gatech.edu/~farshid/infocom06.pdf (2006)
  • 8
    • 24144503356 scopus 로고    scopus 로고
    • Lee, J., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. Lecture Notes in Computer Science 3357 (SAC 2004). Springer Berlin / Heidelberg (2004) 294-307
    • Lee, J., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. Lecture Notes in Computer Science Vol. 3357 (SAC 2004). Springer Berlin / Heidelberg (2004) 294-307
  • 14
    • 0024012644 scopus 로고
    • An introduction to contemporary cryptology
    • Massey, J. L.: An introduction to contemporary cryptology. in Proceedings of the IEEE, vol. 76, no. 5, (1988) 533-549
    • (1988) Proceedings of the IEEE , vol.76 , Issue.5 , pp. 533-549
    • Massey, J.L.1
  • 15
    • 38649107569 scopus 로고    scopus 로고
    • http://www.st.com/stonline/products/families/smartcard/index.htm (2006)
    • (2006)
  • 16
    • 38649135600 scopus 로고    scopus 로고
    • http://www.atmel.eom/products/SecureAVR/overview.asp (2006)
    • (2006)
  • 19
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Adrian, P., John, S., David, W.: Security in wireless sensor networks. ACM Communication, vol. 47, (2004) 53-57
    • (2004) ACM Communication , vol.47 , pp. 53-57
    • Adrian, P.1    John, S.2    David, W.3
  • 20
    • 38649126380 scopus 로고    scopus 로고
    • http://www.wsn.org.cn, 2006
    • (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.