메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Using trust in key distribution in wireless sensor networks

Author keywords

Key distribution; Route selection; Trust; Wireless sensor network

Indexed keywords

HYBRID SENSORS; PUBLIC KEY CRYPTOGRAPHY; ROUTING PROTOCOLS; SENSOR NETWORKS; SENSORS; TELECOMMUNICATION EQUIPMENT; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 50249087902     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOMW.2007.4437800     Document Type: Conference Paper
Times cited : (8)

References (8)
  • 1
    • 11144332044 scopus 로고    scopus 로고
    • K. Römer and F. Mattern, The Design Space of Wireless Sensor Networks, in IEEE Wireless Communications 11 (6): 54-61, December 2004.
    • K. Römer and F. Mattern, The Design Space of Wireless Sensor Networks, in IEEE Wireless Communications 11 (6): 54-61, December 2004.
  • 2
    • 0142103313 scopus 로고    scopus 로고
    • Security and Privacy in Sensor Networks
    • October
    • H. Chan and A. Perrig, Security and Privacy in Sensor Networks, In IEEE Computer, 36(10), October 2003, pp103-105.
    • (2003) In IEEE Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 3
    • 50249124394 scopus 로고    scopus 로고
    • S. A. Camtepe and B. Yener, Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, Department of Computer Science, Rensselaer Polytechnic Institute, Troy, New York, USA, TR-05-07, 2005.
    • S. A. Camtepe and B. Yener, Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, Department of Computer Science, Rensselaer Polytechnic Institute, Troy, New York, USA, TR-05-07, 2005.
  • 4
    • 8344262333 scopus 로고    scopus 로고
    • A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge
    • W. Du, J. Deng, Y. S Han, S. Chen, and P. K. Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, in IEEE INFOCOM, 2004.
    • (2004) IEEE INFOCOM
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 5
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B. C. Neuman and T. Tso, Kerberos: An authentication service for computer networks, in EEE Communications, vol. 32, no. 9, pp. 33-38,September 1994.
    • (1994) EEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Tso, T.2
  • 6
    • 23944459661 scopus 로고    scopus 로고
    • Public Key Cryptography in Sensor Networks - Revisited
    • Proceedings of ESAS'04, C. Castelluccia and H. Hartenstein Eds, Springer, Heidelberg
    • G. Gaubatz, J. P. Kaps and B. Sunar, Public Key Cryptography in Sensor Networks - Revisited, In Proceedings of ESAS'04, C. Castelluccia and H. Hartenstein (Eds.), LNCS 3313, pp. 2-19, Springer, Heidelberg, 2004.
    • (2004) LNCS , vol.3313 , pp. 2-19
    • Gaubatz, G.1    Kaps, J.P.2    Sunar, B.3
  • 7
    • 50249100971 scopus 로고    scopus 로고
    • H. Zhu, B. Feng, and R. H. Deng, Computing of Trust in Distributed Networks, Cryptology ePrint Archive: Report 2003/056, Available at: http://eprint.iacr.org, 2003.
    • H. Zhu, B. Feng, and R. H. Deng, Computing of Trust in Distributed Networks, Cryptology ePrint Archive: Report 2003/056, Available at: http://eprint.iacr.org, 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.