메뉴 건너뛰기




Volumn , Issue , 2003, Pages 62-71

Random key-assignment for secure wireless sensor networks

Author keywords

Distributed wireless sensors networks; Key management protocols; Secure pair wise communications; Sensor to sensor authentication

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER ARCHITECTURE; COMPUTER SIMULATION; NETWORK PROTOCOLS; OPTIMIZATION; SECURITY OF DATA; SENSORS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 4544301464     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/986858.986868     Document Type: Conference Paper
Times cited : (236)

References (25)
  • 5
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • NAI Labs
    • D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and approaches for distributed sensor network security. Technical Report #00-010, NAI Labs, 2000.
    • (2000) Technical Report #00-010 , vol.10
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 7
    • 0033347104 scopus 로고    scopus 로고
    • Performance comparison of battery power consumption in wireless multiple access protocols
    • Jyh-Cheng Chen, Krishna M. Sivalingam, and Prathima Agrawal. Performance comparison of battery power consumption in wireless multiple access protocols. Wireless Networks, 5(6):445-460, 1999.
    • (1999) Wireless Networks , vol.5 , Issue.6 , pp. 445-460
    • Chen, J.-C.1    Sivalingam, K.M.2    Agrawal, P.3
  • 11
    • 0033906585 scopus 로고    scopus 로고
    • Max-min d-cluster formation in wireless ad hoc networks
    • A.D. Amis et al. Max-min d-cluster formation in wireless ad hoc networks. In Proceedings of INFOCOM 2000, pages 32-41, 2000.
    • (2000) Proceedings of INFOCOM 2000 , pp. 32-41
    • Amis, A.D.1
  • 12
    • 3042579385 scopus 로고    scopus 로고
    • Springer. ISBN 1-85233-431-2
    • John Haigh. Probabilty Models. Springer, 2002. ISBN 1-85233-431-2.
    • (2002) Probabilty Models
    • Haigh, J.1
  • 17
    • 0003584029 scopus 로고
    • Fips pub 140-1, National Institute of Standard and Technology, January
    • NIST. Fips pub 140-1, security requirements for cryptographic modules. National Institute of Standard and Technology, January 1994.
    • (1994) Security Requirements for Cryptographic Modules
  • 18
    • 0003582910 scopus 로고    scopus 로고
    • Addison Wesley Professional. ISBN 0-201-30976-9
    • Charles E. Perkins. Ad Hoc Networking. Addison Wesley Professional, 2001. ISBN 0-201-30976-9.
    • (2001) Ad Hoc Networking
    • Perkins, C.E.1
  • 21
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc mobile wireless network
    • April
    • E.M. Royer and C-K Toh. A review of current routing protocols for ad hoc mobile wireless network. In IEEE Personal Communication Magazine, pages 46-55, April 1999.
    • (1999) IEEE Personal Communication Magazine , pp. 46-55
    • Royer, E.M.1    Toh, C.-K.2
  • 25
    • 84943553152 scopus 로고    scopus 로고
    • Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
    • ISE-TR-03-01, George Mason University, March 2003. To appear in the, Atlanta, Georgia, November 4-7
    • S. Zhu, S. Xu, S. Setia and S. Jajodia. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. ISE-TR-03-01, George Mason University, March 2003. To appear in the 11th IEEE International Conference on Network Protocols (ICNP'03), Atlanta, Georgia, November 4-7, 2003.
    • (2003) 11th IEEE International Conference on Network Protocols (ICNP'03)
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.