메뉴 건너뛰기




Volumn , Issue , 2008, Pages 11-18

Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CHLORINE COMPOUNDS; COMPUTER SYSTEMS; CRYPTOGRAPHY; DATA STORAGE EQUIPMENT; SECURITY SYSTEMS; SENSOR NETWORKS; SENSORS;

EID: 51849154205     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2008.77     Document Type: Conference Paper
Times cited : (71)

References (19)
  • 1
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Springer-Verlag
    • D. Boneh and M. Franlin. Identity-Based Encryption from the Weil Pairing. In CRYPTO, pages 213-229, Springer-Verlag, 2001.
    • (2001) CRYPTO , pp. 213-229
    • Boneh, D.1    Franlin, M.2
  • 3
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer Intermediaries for Key Establishment in Sensor Networks
    • Miami, FL, March
    • H. Chan and A. Perrig. PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In INFOCOM, Miami, FL, March 2005.
    • (2005) INFOCOM
    • Chan, H.1    Perrig, A.2
  • 4
    • 24944474308 scopus 로고    scopus 로고
    • A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks
    • W. Du and J. Deng. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Du, W.1    Deng, J.2
  • 5
    • 0000534667 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In In Advances in Crytography - Proceedings of CRYPTO, pages 211-222, 1985.
    • (1985) In Advances in Crytography - Proceedings of CRYPTO , pp. 211-222
    • ElGamal, T.1
  • 6
    • 0038341106 scopus 로고    scopus 로고
    • A Key-management Scheme for Distributed Sensor Networks
    • November
    • L. Eschenauer and V.D. Gligor. A Key-management Scheme for Distributed Sensor Networks. In ACM CCS, November 2002.
    • (2002) ACM CCS
    • Eschenauer, L.1    Gligor, V.D.2
  • 7
    • 27244436587 scopus 로고    scopus 로고
    • Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
    • Cambridge, MA, Aug
    • N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In CHES, Cambridge, MA, Aug. 2004.
    • (2004) CHES
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 8
    • 51849112552 scopus 로고    scopus 로고
    • An Liu and Peng Ning, 2005
    • An Liu and Peng Ning. http://discovery.csc.ncsu.edu/software/TinyECC/, 2005.
  • 9
    • 3042822764 scopus 로고    scopus 로고
    • Establishing Pairwise Keys in Distributed Sensor Networks
    • Washington, DC, October
    • D. Liu and P. Ning. Establishing Pairwise Keys in Distributed Sensor Networks. In ACM CCS, Washington, DC, October 2003.
    • (2003) ACM CCS
    • Liu, D.1    Ning, P.2
  • 10
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • September
    • B. Clifford Neuman and Theodore Ts'o. Kerberos: An Authentication Service for Computer Networks. IEEE Communications, 32(9):33-38, September 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Clifford Neuman, B.1    Ts'o, T.2
  • 12
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. How to Share a Secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 13
    • 51849103485 scopus 로고    scopus 로고
    • TinyOS. TinyOS 1.1.15. http://www.tinyos.net, 2006.
    • (2006) TinyOS 1.1.15
  • 15
    • 51349093348 scopus 로고    scopus 로고
    • ECC: An Elliptic Curve Cryptography Suite on Sensor Motes
    • Technical Report WM-CS-2007-11, College of William and Mary, Computer Science, Williamsburg, VA
    • H. Wang, B. Sheng, C. C. Tan, and Q. Li. WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes. Technical Report WM-CS-2007-11, College of William and Mary, Computer Science, Williamsburg, VA, 2007.
    • (2007)
    • Wang, H.1    Sheng, B.2    Tan, C.C.3    WM, Q.L.4
  • 16
    • 3543100577 scopus 로고    scopus 로고
    • Statistical En-Route Filtering of Injected False Data in Sensor Networks
    • F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical En-Route Filtering of Injected False Data in Sensor Networks. In INFOCOM, 2004.
    • (2004) INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 18
    • 29844438193 scopus 로고    scopus 로고
    • Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks
    • Chicago, IL, May
    • W. Zhang, H. Song, S. Zhu, and G. Cao. Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks. In MOBIHOC, Chicago, IL, May 2005.
    • (2005) MOBIHOC
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 19
    • 33144476837 scopus 로고    scopus 로고
    • Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks
    • Feb
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang. Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications, 24(2):247-260, Feb. 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.