메뉴 건너뛰기




Volumn , Issue , 2008, Pages 183-193

Secure multi-hop network programming with multiple one-way key chains

Author keywords

Broadcast authentication; Code distribution; Network programming protocols; Sensor network security

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; BROADCASTING; INTERNET; METROPOLITAN AREA NETWORKS; NETWORK SECURITY; SENSOR NETWORKS; SENSORS; TELECOMMUNICATION EQUIPMENT; WIRELESS SENSOR NETWORKS;

EID: 56749158656     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352533.1352564     Document Type: Conference Paper
Times cited : (29)

References (33)
  • 2
    • 22744432612 scopus 로고    scopus 로고
    • The dynamic behavior of a data dissemination protocol for network programming at scale
    • ACM Press
    • Jonathan W. Hui and David Culler. The dynamic behavior of a data dissemination protocol for network programming at scale. In SenSys '04, pages 81-94. ACM Press, 2004.
    • (2004) SenSys '04 , pp. 81-94
    • Hui, J.W.1    Culler, D.2
  • 4
    • 27644540636 scopus 로고    scopus 로고
    • Mnp: Multihop network reprogramming service for sensor networks
    • ACM Press
    • Limin Wang. Mnp: multihop network reprogramming service for sensor networks. In SenSys '04, pages 285-286. ACM Press, 2004.
    • (2004) SenSys '04 , pp. 285-286
    • Wang, L.1
  • 5
    • 20344373400 scopus 로고    scopus 로고
    • Incremental network programming for wireless sensors
    • Jaein Jeong and D. Culler. Incremental network programming for wireless sensors. In IEEE SECON 2004, Pages 25-33, 2004.
    • (2004) IEEE SECON 2004 , pp. 25-33
    • Jeong, J.1    Culler, D.2
  • 7
    • 0043126255 scopus 로고    scopus 로고
    • A method FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS
    • Technical Report MIT/LCS/TM-82, 1977
    • R. L. Rivest, A. Shamir, and L. M. Adelman. A method FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS. Technical Report MIT/LCS/TM-82, 1977.
    • Rivest, R.L.1    Shamir, A.2    Adelman, L.M.3
  • 10
    • 34247376029 scopus 로고    scopus 로고
    • Securing the deluge network programming system
    • ACM Press
    • Prabal K. Dutta, Jonathan W. Hui, David C. Chu, and David E. Culler. Securing the deluge network programming system. In IPSN '06, pages 326 - 333. ACM Press, 2006.
    • (2006) IPSN '06 , pp. 326-333
    • Dutta, P.K.1    Hui, J.W.2    Chu, D.C.3    Culler, D.E.4
  • 12
    • 33947642085 scopus 로고    scopus 로고
    • Sluice: Secure dissemination of code updates in sensor networks
    • P. E. Lanigan, R. Gandhi, and P. Narasimhan. Sluice: Secure dissemination of code updates in sensor networks. In ICDCS 2006, pages 53-63, 2006.
    • (2006) ICDCS 2006 , pp. 53-63
    • Lanigan, P.E.1    Gandhi, R.2    Narasimhan, P.3
  • 13
    • 34247397108 scopus 로고    scopus 로고
    • Secure code distribution in dynamically programmable wireless sensor networks
    • ACM Press
    • Jing Deng, Richard Han, and Shivakant Mishra. Secure code distribution in dynamically programmable wireless sensor networks. In IPSN '06, pages 292 - 300. ACM Press, 2006.
    • (2006) IPSN '06 , pp. 292-300
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 14
    • 44349158878 scopus 로고    scopus 로고
    • Confidential and secure broadcast in wireless sensor networks
    • Jaleel Shaheen, Diethelm Ostry, Vijay Sivaraman, and Sanjay Jha. Confidential and secure broadcast in wireless sensor networks. In PIMRC 2007, 2007.
    • (2007) PIMRC 2007
    • Shaheen, J.1    Ostry, D.2    Sivaraman, V.3    Jha, S.4
  • 15
    • 56749118494 scopus 로고    scopus 로고
    • Tradeoffs in configuring secure data dissemination in sensor networks: An empirical outlook
    • Technical Report 006, Carnegie Mellon University, May
    • Patrick E. Lanigan, Priya Narasimhan, and Rajeev Gandhi. Tradeoffs in configuring secure data dissemination in sensor networks: An empirical outlook. Technical Report 006, Carnegie Mellon University, May 2007.
    • (2007)
    • Lanigan, P.E.1    Narasimhan, P.2    Gandhi, R.3
  • 17
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • ACM Press
    • Laurent Eschenauer and Virgil D. Gligor. A key-management scheme for distributed sensor networks. In CCS '02, pages 41-47. ACM Press, 2002.
    • (2002) CCS '02 , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 19
    • 10044284351 scopus 로고    scopus 로고
    • Leap: Efficient security mechanisms for large-scale distributed sensor networks
    • ACM Press
    • Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. Leap: efficient security mechanisms for large-scale distributed sensor networks. In CCS '03, pages 62 - 72. ACM Press, 2003.
    • (2003) CCS '03 , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 21
    • 26644435250 scopus 로고    scopus 로고
    • Simulating the power consumption of large-scale sensor network applications
    • ACM Press
    • Victor Shnayder, Mark Hempstead, Bor-Rong Chen, Geoff W. Allen, and Matt Welsh. Simulating the power consumption of large-scale sensor network applications. In SenSys '04, pages 188-200. ACM Press, 2004.
    • (2004) SenSys '04 , pp. 188-200
    • Shnayder, V.1    Hempstead, M.2    Chen, B.-R.3    Allen, G.W.4    Welsh, M.5
  • 22
    • 34547466172 scopus 로고    scopus 로고
    • Seven cardinal properties of sensor network broadcast authentication
    • ACM Press
    • Mark Luk, Adrian Perrig, and Bram Whillock. Seven cardinal properties of sensor network broadcast authentication. In SASN '06, pages 147-156. ACM Press, 2006.
    • (2006) SASN '06 , pp. 147-156
    • Luk, M.1    Perrig, A.2    Whillock, B.3
  • 23
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • November
    • Leslie Lamport. Password authentication with insecure communication. Commun. ACM, 24(11):770-772, November 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 24
    • 79959884874 scopus 로고    scopus 로고
    • Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
    • ACM Press
    • Cynthia Kuo, Mark Luk, Rohit Negi, and Adrian Perrig. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In SenSys '07. ACM Press, 2007.
    • (2007) SenSys '07
    • Kuo, C.1    Luk, M.2    Negi, R.3    Perrig, A.4
  • 25
    • 77953853641 scopus 로고    scopus 로고
    • Shake them up!: A movement-based pairing protocol for cpu-constrained devices
    • New York, NY, USA, ACM Press
    • Claude Castelluccia and Pars Mutaf. Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In MobiSys '05, pages 51 - 64, New York, NY, USA, 2005. ACM Press.'
    • (2005) MobiSys '05 , pp. 51-64
    • Castelluccia, C.1    Mutaf, P.2
  • 27
    • 26444574670 scopus 로고    scopus 로고
    • Tinysec: A link layer security architecture for wireless sensor networks
    • ACM Press
    • Chris Karlof, Naveen Sastry, and David Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In SenSys '04, pages 162-175. ACM Press, 2004.
    • (2004) SenSys '04 , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 28
    • 33747445938 scopus 로고    scopus 로고
    • Deploying long-lived and cost-effective hybrid sensor networks
    • November
    • Wen Hu, Chun T. Chou, Sanjay Jha, and Nirupama Bulusu. Deploying long-lived and cost-effective hybrid sensor networks. Ad Hoc Networks, 4(6):749-767, November 2006.
    • (2006) Ad Hoc Networks , vol.4 , Issue.6 , pp. 749-767
    • Hu, W.1    Chou, C.T.2    Jha, S.3    Bulusu, N.4
  • 30
    • 56749128593 scopus 로고    scopus 로고
    • Telosb - telosb mote platform. Technical Report 0094.
    • Telosb - telosb mote platform. Technical Report 0094.
  • 31
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • Ari Juels and John Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In NDSS '99, Networks and Distributed Security Systems, pages 151-165. 1999.
    • (1999) NDSS '99, Networks and Distributed Security Systems , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 33
    • 18844399081 scopus 로고    scopus 로고
    • Tossim: Accurate and scalable simulation of entire tinyos applications
    • ACM Press
    • Philip Levis, Nelson Lee, Matt Welsh, and David Culler. Tossim: accurate and scalable simulation of entire tinyos applications. In SenSys '03, pages 126-137. ACM Press, 2003.
    • (2003) SenSys '03 , pp. 126-137
    • Levis, P.1    Lee, N.2    Welsh, M.3    Culler, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.