메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 457-466

S2RP: A secure and scalable rekeying protocol for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; MESSAGE PASSING; NETWORK PROTOCOLS; SCALABILITY;

EID: 39049087207     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBHOC.2006.278586     Document Type: Conference Paper
Times cited : (39)

References (20)
  • 2
    • 3543065166 scopus 로고    scopus 로고
    • Distributed Control Applications Within Sensor Networks
    • August
    • B. Sinopoli, C. Sharp, L. S. S. Schaffert, and S. S. Sastry, "Distributed Control Applications Within Sensor Networks," Proceedings of the IEEE, vol. 91, no. 8, pp. 1235-1246, August 2003.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.8 , pp. 1235-1246
    • Sinopoli, B.1    Sharp, C.2    Schaffert, L.S.S.3    Sastry, S.S.4
  • 8
    • 0345565893 scopus 로고    scopus 로고
    • A Survey of Key Management for Secure Group Communication
    • September
    • S. Rafaeli and D. Hutchison, "A Survey of Key Management for Secure Group Communication," /ICM Computing Surveys, vol. 35, no. 3, pp. 309-329, September 2003.
    • (2003) ICM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 9
    • 0033893174 scopus 로고    scopus 로고
    • Secure Group Communications using Key Graphs
    • February
    • C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure Group Communications using Key Graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, February 2000.
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.G.2    Lam, S.S.3
  • 11
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • November
    • L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, November 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 12
    • 33845938314 scopus 로고    scopus 로고
    • An efficient key revocation protocol for wireless sensor networks
    • Niagara-Falls, Buffalo-NY, 26-29 June
    • G. Dini and I. M. Savino, "An efficient key revocation protocol for wireless sensor networks," in Proceedings of IEEE WOW-MOM'06, Niagara-Falls, Buffalo-NY, 26-29 June 2006.
    • (2006) Proceedings of IEEE WOW-MOM'06
    • Dini, G.1    Savino, I.M.2
  • 13
    • 84944878354 scopus 로고    scopus 로고
    • Alfred J. Menezes and Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography. CRC Press, October 1996.
    • Alfred J. Menezes and Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography. CRC Press, October 1996.
  • 14
    • 84886007598 scopus 로고    scopus 로고
    • Moteiv, "Tmote sky," http://www.moteiv.com/.
    • Tmote sky
  • 16
    • 0347124644 scopus 로고    scopus 로고
    • 161 National Institute of Standards and Technology NIST
    • [161 National Institute of Standards and Technology (NIST), "SKIPJACK and KEA algorithm specifications," 1998.
    • (1998) SKIPJACK and KEA algorithm specifications
  • 17
    • 84948990100 scopus 로고
    • The RC5 encryption algorithm
    • B. Preenel, Ed, Leuven, Belgium: Springer-Verlag, December 14-16
    • R. L. Rivest, "The RC5 encryption algorithm," in Proceedings of the Second International Workshop on fast Software Encryption, B. Preenel, Ed., vol. LNCS 1008. Leuven, Belgium: Springer-Verlag, December 14-16 1994, pp. 86-96.
    • (1994) Proceedings of the Second International Workshop on fast Software Encryption , vol.LNCS 1008 , pp. 86-96
    • Rivest, R.L.1
  • 18
    • 0009504774 scopus 로고    scopus 로고
    • Gaithersburg, MD, USA: National Institute for Standards and Technology, Apr. 1995, Online, Available
    • National Institute of Standards and Technology, FIPS PUB 180-1: Secure Hash Standard. Gaithersburg, MD, USA: National Institute for Standards and Technology, Apr. 1995. [Online]. Available: http://www.itl.nist.gov/fipspubs/ fip180-1.htm
    • FIPS PUB 180-1: Secure Hash Standard


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.