메뉴 건너뛰기




Volumn , Issue , 2007, Pages 368-373

Key management scheme for sensor networks with proactive key revocation and sleep state consideration

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL SYSTEMS; CONTROL THEORY; DETECTORS; ENERGY CONVERSION; ENERGY RESOURCES; LAWS AND LEGISLATION; MECHANISMS; MILITARY DATA PROCESSING; NETWORK MANAGEMENT; OPTIMIZATION; PARALLEL PROCESSING SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; ROBUST CONTROL; SENSORS; SLEEP RESEARCH; TELECOMMUNICATION EQUIPMENT; WIRELESS SENSOR NETWORKS;

EID: 47849101266     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNPCW.2007.4351512     Document Type: Conference Paper
Times cited : (3)

References (14)
  • 1
    • 50049084516 scopus 로고    scopus 로고
    • Secure Dynamic Key Management for Sensor Networks
    • Dubai, Nov 19-21
    • Rabia Riaz, H. Farooq Ahmed, Ki Hyung Kim, "Secure Dynamic Key Management for Sensor Networks", IIT 06, Dubai, Nov 19-21 2006.
    • (2006) IIT 06
    • Rabia Riaz, H.1    Farooq Ahmed, K.2    Kim, H.3
  • 2
    • 47849113321 scopus 로고    scopus 로고
    • John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary. Wireless sensor network security: A survey. (Book chapter) Security in Distributed, Grid, and Pervasive Computing, Yang Xiao (Eds.), CRC Press
    • John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary. "Wireless sensor network security: A survey". (Book chapter) Security in Distributed, Grid, and Pervasive Computing, Yang Xiao (Eds.), CRC Press
  • 3
    • 33646918277 scopus 로고    scopus 로고
    • Dynamic key management in sensor networks
    • April pages
    • Eltoweissy, M. Moharrum, M. Mukkamala, R. "Dynamic key management in sensor networks", IEEE Communications Magazine, April 2006 Volume: 44, Issue: 4 page(s): 122- 130
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 122-130
    • Eltoweissy, M.1    Moharrum, M.2    Mukkamala, R.3
  • 6
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • March
    • W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney. "A key management scheme for wireless sensor networks using deployment knowledge". IEEE INFOCOM 2004, pages 586-597, March 2004.
    • (2004) IEEE INFOCOM , vol.2004 , pp. 586-597
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 7
    • 33745933645 scopus 로고    scopus 로고
    • A Key PreDistribution Scheme for Secure Sensor Networks Using Probability Density Function of Node Deployment
    • November 7
    • T. Ito, H. Ohta, N. Matsuda, T. Yoneda ,"A Key PreDistribution Scheme for Secure Sensor Networks Using Probability Density Function of Node Deployment", SASN'05, Pages 69-75, November 7, 2005
    • (2005) SASN'05 , pp. 69-75
    • Ito, T.1    Ohta, H.2    Matsuda, N.3    Yoneda, T.4
  • 8
    • 33744945781 scopus 로고    scopus 로고
    • A key pre-distribution scheme using deployment knowledge for wireless sensor networks
    • April Pages
    • Yu, Z.; Guan, Y., "A key pre-distribution scheme using deployment knowledge for wireless sensor networks", IPSN 2005. April 2005 Page(s):261 - 268
    • (2005) IPSN 2005 , pp. 261-268
    • Yu, Z.1    Guan, Y.2
  • 9
    • 33646919610 scopus 로고    scopus 로고
    • Combinatorial Optimization of Key Management in Group Communications
    • Mar
    • M. Eltoweissy et al., "Combinatorial Optimization of Key Management in Group Communications," J. Network and Sys. Mgmt., Mar. 2004, p. 332b.
    • (2004) J. Network and Sys. Mgmt
    • Eltoweissy, M.1
  • 13
    • 47849088354 scopus 로고    scopus 로고
    • Buffer Overflows and Remote Root Exploits, IEEE Personal Communications, October
    • Steve Bellovin, "Buffer Overflows and Remote Root Exploits," IEEE Personal Communications, October 1999.
    • (1999)
    • Bellovin, S.1
  • 14
    • 47849100025 scopus 로고    scopus 로고
    • I. Crossbow Technology, MICA2: Wireless Measurement System, http://www.xbow.com/Products/Product_pdf_files/Wirelesspdf/6020-0042-0%4 AMICA2. pdf.
    • I. Crossbow Technology, "MICA2: Wireless Measurement System," http://www.xbow.com/Products/Product_pdf_files/Wirelesspdf/6020-0042-0%4AMICA2. pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.