메뉴 건너뛰기




Volumn 5, Issue , 2006, Pages 2276-2282

Dynamic merkle trees for verifying privileges in sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA ACQUISITION; NETWORK MANAGEMENT; SECURITY OF DATA; TREES (MATHEMATICS);

EID: 42549134558     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2006.255109     Document Type: Conference Paper
Times cited : (4)

References (26)
  • 2
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • H. Chan and A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks. In INFOCOM, 2005.
    • (2005) INFOCOM
    • Chan, H.1    Perrig, A.2
  • 4
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • W Du, J. Deng, Y. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM, 2004.
    • (2004) INFOCOM
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4    Varshney, P.5
  • 5
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key predistribution scheme for wireless sensor networks
    • W. Du, J. Deng, Y. Han, and P. Varshney. A pairwise key predistribution scheme for wireless sensor networks. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 6
    • 29844457287 scopus 로고    scopus 로고
    • W Du, R. Wang, and P. Ning. an efficient scheme for authenticating public keys in sensor networks. In MobiHoc, 2005.
    • W Du, R. Wang, and P. Ning. an efficient scheme for authenticating public keys in sensor networks. In MobiHoc, 2005.
  • 7
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • L. Eschenaer and V.D.Gligor. A key-management scheme for distributed sensor networks. In ACM CCS, 2002.
    • (2002) ACM CCS
    • Eschenaer, L.1    Gligor, V.D.2
  • 8
    • 85055795738 scopus 로고
    • Variations on the Themes of Message Freshness and Replay, or the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols
    • L. Gong. Variations on the Themes of Message Freshness and Replay, or the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols. In Proceedings of the Computer Security Foundations Workshop VI, 1993.
    • (1993) Proceedings of the Computer Security Foundations Workshop , vol.6
    • Gong, L.1
  • 10
    • 24944508408 scopus 로고    scopus 로고
    • Distillation codes and applications to DOS resistant multicast authentication
    • C. Karlof, N. sastry, Y. Li, A. Perrig, and J. Tygar. Distillation codes and applications to DOS resistant multicast authentication. In NDSS, 2004.
    • (2004) NDSS
    • Karlof, C.1    sastry, N.2    Li, Y.3    Perrig, A.4    Tygar, J.5
  • 11
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • November
    • L. Lamport. Password authentication with insecure communication. Communication of the ACM, 24(11), November 1981.
    • (1981) Communication of the ACM , vol.24 , Issue.11
    • Lamport, L.1
  • 12
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
    • D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In NDSS, 2003.
    • (2003) NDSS
    • Liu, D.1    Ning, P.2
  • 13
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairewise keys in distributed sensor networks
    • D. Liu and P. Ning. Establishing pairewise keys in distributed sensor networks. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Liu, D.1    Ning, P.2
  • 14
    • 33749513007 scopus 로고    scopus 로고
    • Practical broadcast authentication in sensor networks
    • D. Liu, P. Ning, S. Zhu, and S. Jajodia. Practical broadcast authentication in sensor networks. In Mobiquitous, 2005.
    • (2005) Mobiquitous
    • Liu, D.1    Ning, P.2    Zhu, S.3    Jajodia, S.4
  • 15
    • 39049105693 scopus 로고    scopus 로고
    • UC Berkey The EECS department
    • UC Berkey The EECS department. Cotbots: The mobile mote-based robots, http://www-bsac.eecs.berkeley.edu/projects/cotbots/.
    • Cotbots: The mobile mote-based robots
  • 18
    • 4544244334 scopus 로고    scopus 로고
    • SIA: Secure information aggregation in sensor networks
    • B. Przydatek, D. Song, and A. Perrig. SIA: Secure information aggregation in sensor networks. In ACM SenSys, 2003.
    • (2003) ACM SenSys
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 19
  • 20
    • 42549135649 scopus 로고    scopus 로고
    • I. C. Technology. Mica2: Wireless measurement system, http://www.xbow.com/product.pdf-files/wireless.pdf/6020-0042-0%4.a.mi ca2.pdf.
    • I. C. Technology. Mica2: Wireless measurement system, http://www.xbow.com/product.pdf-files/wireless.pdf/6020-0042-0%4.a.mi ca2.pdf.
  • 21
    • 17444417505 scopus 로고    scopus 로고
    • Efficient collection of sensor data in remote fields using mobile collectors
    • Y. Tirta, Z. Li, Y. Lu, and S. Bagchi. Efficient collection of sensor data in remote fields using mobile collectors. In ICCCN, 2004.
    • (2004) ICCCN
    • Tirta, Y.1    Li, Z.2    Lu, Y.3    Bagchi, S.4
  • 22
    • 0034772133 scopus 로고    scopus 로고
    • Geography informed energy conservation for Ad Hoc routing
    • Y. Xu, J. Heidemann, and D. Estrin. Geography informed energy conservation for Ad Hoc routing. In ACM MobiCom, 2001.
    • (2001) ACM MobiCom
    • Xu, Y.1    Heidemann, J.2    Estrin, D.3
  • 23
    • 0036949025 scopus 로고    scopus 로고
    • A two-tier data dissemination model for large-scale wireless sensor networks
    • F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang. A two-tier data dissemination model for large-scale wireless sensor networks. In ACM MobiCom, 2002.
    • (2002) ACM MobiCom
    • Ye, F.1    Luo, H.2    Cheng, J.3    Lu, S.4    Zhang, L.5
  • 24
    • 20344387783 scopus 로고    scopus 로고
    • Data Dissemination with Ring-Based Index for Wireless Sensor Networks
    • W. Zhang, G. Cao, and T. L. Porta. Data Dissemination with Ring-Based Index for Wireless Sensor Networks. In IEEE ICNP, 2003.
    • (2003) IEEE ICNP
    • Zhang, W.1    Cao, G.2    Porta, T.L.3
  • 25
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • W. Zhang, H. Song, S. Zhu, and G. Cao. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. In MobiHoc, pages 378-389, 2005.
    • (2005) MobiHoc , pp. 378-389
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 26
    • 39049087772 scopus 로고    scopus 로고
    • Supporting Secure Communication and Data Collection in Mobile Sensor Networ
    • L. Zhou, J. Ni, and C. Ravishankar. Supporting Secure Communication and Data Collection in Mobile Sensor Networ. In INFOCOM, 2006.
    • (2006) INFOCOM
    • Zhou, L.1    Ni, J.2    Ravishankar, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.