메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Securing very dynamic groups and data aggregation in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; AGGLOMERATION; CRYPTOGRAPHY; HYBRID SENSORS; PUBLIC KEY CRYPTOGRAPHY; RELIABILITY; SENSOR NETWORKS; SENSORS; WIRELESS NETWORKS;

EID: 50249106991     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBHOC.2007.4428625     Document Type: Conference Paper
Times cited : (15)

References (17)
  • 1
    • 0038341106 scopus 로고    scopus 로고
    • A Key Management Scheme [ for Distributed Sensor Networks
    • L. Eschenauer and V. D. Gligor, "A Key Management Scheme [ for Distributed Sensor Networks," ACM CCS, pp. 41-47, 2000.
    • (2000) ACM CCS , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 2
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Sandro Rafaeli and David Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, pp. 309-329, 2003.
    • (2003) ACM Computing Surveys , vol.35 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 3
    • 50249091871 scopus 로고    scopus 로고
    • Authenticated interleaved encryption
    • Cryptology ePrint Archive, Report 2006/416
    • Claude Castelluccia, "Authenticated interleaved encryption," Cryptology ePrint Archive, Report 2006/416, 2006, http://eprint.iacr.org/.
    • (2006)
    • Castelluccia, C.1
  • 4
    • 27544485427 scopus 로고    scopus 로고
    • Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts
    • May
    • M. Goodrich, "Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts," in IEEE Security and Privacy, May 2005.
    • (2005) IEEE Security and Privacy
    • Goodrich, M.1
  • 5
    • 50249156626 scopus 로고    scopus 로고
    • Does encryption with redundancy provide authenticity?
    • Jee An and Mihir Bellare, "Does encryption with redundancy provide authenticity?," in EUROCRYPT, 2001.
    • (2001) EUROCRYPT
    • Jee An1    Bellare, M.2
  • 6
    • 0010227492 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications
    • Hugo Krawczyk, "The order of encryption and authentication for protecting communications," in CRYPTO, 2001.
    • (2001) CRYPTO
    • Krawczyk, H.1
  • 8
    • 50249113528 scopus 로고    scopus 로고
    • Effi cient aggregation of encryption data in wireless sensor networks
    • Claude Castelluccia, Einar Mykletun, and Gene Tsudik, "Effi cient aggregation of encryption data in wireless sensor networks," in IEEE Mobiquitous, 2005.
    • (2005) IEEE Mobiquitous
    • Castelluccia, C.1    Mykletun, E.2    Tsudik, G.3
  • 14
    • 0034449805 scopus 로고    scopus 로고
    • Simple and fault-tolerant key agreement for dynamic collaborative groups
    • November
    • Yongdae Kim, Adrian Perring, and Gene Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in ACM CCS, November 2000, pp. 235-244.
    • (2000) ACM CCS , pp. 235-244
    • Kim, Y.1    Perring, A.2    Tsudik, G.3
  • 15
    • 33645388276 scopus 로고    scopus 로고
    • Integrity preservation for communication in sensor networks,
    • Tech. Rep. 434, ETH Zurich, Institute for Pervasive Computing, Feb
    • Harald Vogt, "Integrity preservation for communication in sensor networks," Tech. Rep. 434, ETH Zurich, Institute for Pervasive Computing, Feb. 2004.
    • (2004)
    • Vogt, H.1
  • 16
    • 3543056512 scopus 로고    scopus 로고
    • An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks
    • Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," Security and Privacy, 2004.
    • (2004) Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 17
    • 50249188062 scopus 로고    scopus 로고
    • Suna Melek Önen and Refi k Molva, Secure data aggregation with multiple encryption, in EWSN 2007, European Wireless Sensor Networks, January 29-31, 2007, Delf, The Netherlands, 2007.
    • Suna Melek Önen and Refi k Molva, "Secure data aggregation with multiple encryption," in EWSN 2007, European Wireless Sensor Networks, January 29-31, 2007, Delf, The Netherlands, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.