메뉴 건너뛰기




Volumn 52, Issue 11, 2008, Pages 2227-2236

Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange

Author keywords

IEEE 802.15.4; Key exchange algorithms; Security in wireless sensor networks; Wireless sensor networks

Indexed keywords

CLUSTER ANALYSIS; NETWORK PROTOCOLS; RELIABILITY THEORY; TELECOMMUNICATION TRAFFIC; WIRELESS SENSOR NETWORKS;

EID: 46549088074     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2008.04.006     Document Type: Article
Times cited : (12)

References (20)
  • 1
    • 28744455779 scopus 로고    scopus 로고
    • B. Arazi, I. Elhahnany, H. Qi, Revisiting public-key cryptography for wireless sensor networks, IEEE Computer, 2005, pp. 103-105.
    • B. Arazi, I. Elhahnany, H. Qi, Revisiting public-key cryptography for wireless sensor networks, IEEE Computer, 2005, pp. 103-105.
  • 2
    • 46549083791 scopus 로고    scopus 로고
    • Atmega128(l) - 8-bit avr microcontroller with 128 k bytes in-system programmable flash. datasheet, ATMEL Corporation. , 2006.
    • Atmega128(l) - 8-bit avr microcontroller with 128 k bytes in-system programmable flash. datasheet, ATMEL Corporation. , 2006.
  • 3
    • 33750286059 scopus 로고    scopus 로고
    • G. Bertoni, L. Breveglieri, M. Venturi, Power aware design of an elliptic curve coprocessor for 8 bit platforms, in: Proceeding of the Fourth Annual IEEE Conference on Pervasive Computing and Communications, 2006 IEEE PERCOM 2006, 2006.
    • G. Bertoni, L. Breveglieri, M. Venturi, Power aware design of an elliptic curve coprocessor for 8 bit platforms, in: Proceeding of the Fourth Annual IEEE Conference on Pervasive Computing and Communications, 2006 IEEE PERCOM 2006, 2006.
  • 6
    • 84962855303 scopus 로고    scopus 로고
    • A. Fiskiran, R. Lee, Workload characterization of elliptic curve cryptography and other network security for constrained environments, in: Proceedings of IEEE International Workshop on Workload Characterization 2002, 2002, pp. 127-137.
    • A. Fiskiran, R. Lee, Workload characterization of elliptic curve cryptography and other network security for constrained environments, in: Proceedings of IEEE International Workshop on Workload Characterization 2002, 2002, pp. 127-137.
  • 7
    • 33646812572 scopus 로고    scopus 로고
    • G. Gaubatz, J.-P. Kaps, E. Ozturk, B. Sunar, State of the art in ultra-low power public key cryptography for wireless sensor networks, in: Proceedings of Percom 2005, 2005.
    • G. Gaubatz, J.-P. Kaps, E. Ozturk, B. Sunar, State of the art in ultra-low power public key cryptography for wireless sensor networks, in: Proceedings of Percom 2005, 2005.
  • 8
    • 77953850023 scopus 로고    scopus 로고
    • J. Groszschaedl, Tinysa: a security architecture for wireless sensor networks, in: Proceedings of CoNEXT 2006, 2006.
    • J. Groszschaedl, Tinysa: a security architecture for wireless sensor networks, in: Proceedings of CoNEXT 2006, 2006.
  • 10
    • 46549084397 scopus 로고    scopus 로고
    • IEEE, Wireless MAC and PHY specifications for low rate WPAN, IEEE Std 802.15.4-2006 (Revision of IEEE Std 802.15.4-2003), IEEE, New York, NY, 2006.
    • IEEE, Wireless MAC and PHY specifications for low rate WPAN, IEEE Std 802.15.4-2006 (Revision of IEEE Std 802.15.4-2003), IEEE, New York, NY, 2006.
  • 11
    • 46549083529 scopus 로고    scopus 로고
    • Telosb mote platform datasheet. mote datasheet, CrossBow Technology. .
    • Telosb mote platform datasheet. mote datasheet, CrossBow Technology. .
  • 12
    • 46549087309 scopus 로고    scopus 로고
    • tmote_sky low power wireless sensor module, Technical report, Moteiv Corporation, San Francisco, CA. , 2006.
    • tmote_sky low power wireless sensor module, Technical report, Moteiv Corporation, San Francisco, CA. , 2006.
  • 13
    • 20344381294 scopus 로고    scopus 로고
    • D. Malan, M. Welsh, M. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: Proceeding of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004, 2004, pp. 71-80.
    • D. Malan, M. Welsh, M. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: Proceeding of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004, 2004, pp. 71-80.
  • 14
    • 34547420699 scopus 로고    scopus 로고
    • K. Piotrowski, S. Peter, How public key cryptography influences wireless sensor node lifetime, in: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, 2006, pp. 169-176.
    • K. Piotrowski, S. Peter, How public key cryptography influences wireless sensor node lifetime, in: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, 2006, pp. 169-176.
  • 15
    • 0242443772 scopus 로고    scopus 로고
    • Y. Sankarasubramaniam, Ö.B. Akan, I.F. Akyildiz, ESRT: event-to-sink reliable transport in wireless sensor networks, in: Proceedings of the 4th ACM MobiHoc, Annapolis, MD, June 2003, pp. 177-188.
    • Y. Sankarasubramaniam, Ö.B. Akan, I.F. Akyildiz, ESRT: event-to-sink reliable transport in wireless sensor networks, in: Proceedings of the 4th ACM MobiHoc, Annapolis, MD, June 2003, pp. 177-188.
  • 18
    • 46549083752 scopus 로고
    • North-Holland, Amsterdam, The Netherlands
    • Takagi H. Queueing Analysis. Vacation and Priority Systems vol. 1 (1991), North-Holland, Amsterdam, The Netherlands
    • (1991) Vacation and Priority Systems , vol.1
    • Takagi, H.1
  • 19
    • 33646581008 scopus 로고    scopus 로고
    • A. Wander, N. Gura, H. Eberle, V. Gupta, S. Chang, Energy analysis of public-key cryptography for wirless semsor networks, in: Proceeding of the Third Annual IEEE Conference on Pervasive Computing and Communications, 2005 IEEE PERCOM, 2005, pp. 324-328.
    • A. Wander, N. Gura, H. Eberle, V. Gupta, S. Chang, Energy analysis of public-key cryptography for wirless semsor networks, in: Proceeding of the Third Annual IEEE Conference on Pervasive Computing and Communications, 2005 IEEE PERCOM, 2005, pp. 324-328.
  • 20
    • 25844505160 scopus 로고    scopus 로고
    • M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, S. Singh, Exploiting heterogeneity in sensor networks, in: Proceedings of the INFOCOM05, vol. 2, Miami, FL, March 2005, pp. 878-890.
    • M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, S. Singh, Exploiting heterogeneity in sensor networks, in: Proceedings of the INFOCOM05, vol. 2, Miami, FL, March 2005, pp. 878-890.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.