메뉴 건너뛰기




Volumn 1, Issue 3-4, 2006, Pages 158-166

Load-balanced key establishment methodologies in wireless sensor networks

Author keywords

Diffie Hellman (DH) key generation; public key cryptography; self certification; Wireless Sensor Networks (WSNs) security

Indexed keywords


EID: 49949107235     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.011775     Document Type: Article
Times cited : (27)

References (27)
  • 2
    • 28744455779 scopus 로고    scopus 로고
    • Revisiting public key cryptography for wireless sensor networks
    • Arazi, B., Elhanany, I., Arazi, O. and Qi, H. (2005) ‘Revisiting public key cryptography for wireless sensor networks’, IEEE Computer Magazine, pp.85–87.
    • (2005) IEEE Computer Magazine , pp. 85-87
    • Arazi, B.1    Elhanany, I.2    Arazi, O.3    Qi, H.4
  • 3
    • 77953904148 scopus 로고    scopus 로고
    • Recommendation for key management – part 1: general national institute of standards and technology
    • Barker, E., Barker, W., Burr, W. Polk, W. and Smid, M. (2005) ‘Recommendation for key management – part 1: general national institute of standards and technology’, NIST Special Publication.
    • (2005) NIST Special Publication
    • Barker, E.1    Barker, W.2    Burr, W.3    Polk, W.4    Smid, M.5
  • 5
    • 84952972919 scopus 로고    scopus 로고
    • Certicom ECC challenge
    • Ceritcom (1997) ‘Certicom ECC challenge’, Certicom, Inc. Available at: http://www.certicom.com/index.php.
    • (1997) Certicom, Inc
    • Ceritcom1
  • 8
    • 84952954495 scopus 로고    scopus 로고
    • Mica 2 datasheet
    • Crossbow (2005a) ‘Mica 2 datasheet’, Crossbow Technology, Inc., Available at: http://www.xbow.com.
    • (2005) Crossbow Technology, Inc.
    • Crossbow1
  • 9
    • 84952954495 scopus 로고    scopus 로고
    • Mica 2 datasheet
    • Crossbow (2005b) ‘Mica 2 datasheet’, Crossbow Technology, Inc., Available at: http://www.xbow.com.
    • (2005) Crossbow Technology, Inc.
    • Crossbow1
  • 10
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • Hong Kong, China
    • Du, W., Deng, J., Han, Y.S., Chen, S. and Varshney, P.K. (2004) ‘A key management scheme for wireless sensor networks using deployment knowledge’, Proceedings of IEEE INFOCOM 2004, Hong Kong, China.
    • (2004) Proceedings of IEEE INFOCOM 2004
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 12
  • 14
    • 84990731886 scopus 로고
    • How to prove yourself: practical solutions to identification and signature problems
    • Fiat, A. and Shamir, A. (1987) ‘How to prove yourself: practical solutions to identification and signature problems’, Advances in Cryptology – CRYPTO ’86, Vol. 263, Springer-Verlag, pp.186–196.
    • (1987) Advances in Cryptology – CRYPTO ’86 , vol.263 , Issue.Springer-Verlag , pp. 186-196
    • Fiat, A.1    Shamir, A.2
  • 15
    • 84937570422 scopus 로고
    • Self-certified public keys
    • LNCS
    • Girault, M. (1991) ‘Self-certified public keys’, Advances in Cryptology-EUROCRYPT’91, LNCS, Springer-Verlag, pp.491–497.
    • (1991) Advances in Cryptology-EUROCRYPT’91 , vol.Springer-Verlag , pp. 491-497
    • Girault, M.1
  • 16
    • 3242657408 scopus 로고    scopus 로고
    • Group key agreement efficient in communication
    • Kim, Y., Perrig, A. and Tsudik, G. (2004) ‘Group key agreement efficient in communication’, Communications of the ACM, Vol. 53, No. 7, pp.905–921.
    • (2004) Communications of the ACM , vol.53 , Issue.7 , pp. 905-921
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 20
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Perrig, A., Stankovic, J. and Wagner, D. (2004) ‘Security in wireless sensor networks’, Communications of the ACM, Vol. 47, No. 6, pp.53–57.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 22
    • 3543055736 scopus 로고    scopus 로고
    • Mobile-agent-based collaborative signal and information processing in sensor networks
    • Qi, H., Xu, Y. and Wang, X. (2003) ‘Mobile-agent-based collaborative signal and information processing in sensor networks’, Proceedings of the IEEE, Vol. 91, pp.1172–1183.
    • (2003) Proceedings of the IEEE , vol.91 , pp. 1172-1183
    • Qi, H.1    Xu, Y.2    Wang, X.3
  • 23
  • 24
    • 84976664565 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A. and Adleman, L. (1983) ‘A method for obtaining digital signatures and public-key cryptosystems’, Communications of the ACM, Vol. 26, No. 1, pp.96–99.
    • (1983) Communications of the ACM , vol.26 , Issue.1 , pp. 96-99
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 27
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: a predistribtion and local collaboration-based approach
    • Miami, FL, USA
    • Zhang, W. and Cao, G. (2005) ‘Group rekeying for filtering false data in sensor networks: a predistribtion and local collaboration-based approach’, Proceedings of the 2005 IEEE INFOCOM, Miami, FL, USA.
    • (2005) Proceedings of the 2005 IEEE INFOCOM
    • Zhang, W.1    Cao, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.