메뉴 건너뛰기




Volumn 8, Issue 12, 2008, Pages 7866-7881

A Novel Re-keying Function Protocol (NRFP) for wireless sensor network security

Author keywords

Re keying function; Session key; Session key derivation

Indexed keywords

ADMINISTRATIVE FUNCTIONS; AUTHENTICATION PROTOCOLS; BROADCAST AUTHENTICATION; PROCESS MANAGEMENT SYSTEMS; RE-KEYING; SECURITY AND PERFORMANCE; SESSION KEY; WIRELESS SENSOR NETWORK (WSNS);

EID: 58149190048     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s8127866     Document Type: Article
Times cited : (2)

References (17)
  • 1
    • 4243082091 scopus 로고    scopus 로고
    • Security in Wireless Sensor Networks
    • Perrig, A.; Stankovic, J.; Wagner, D. Security in Wireless Sensor Networks. Commun. ACM 2004, 47, 53-57.
    • (2004) Commun. ACM , vol.47 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 3
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou, L; Haas, Z.J. Securing ad hoc networks. IEEE Netw. 1999, 13, 24-30.
    • (1999) IEEE Netw , vol.13 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 4
    • 10044284351 scopus 로고    scopus 로고
    • Zhu, S.; Setia, S.; Jajodia, S. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In 10th ACM Conference on Computer and Communications Security (CCS '03); ACM Press 2003, 62-72.
    • Zhu, S.; Setia, S.; Jajodia, S. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In 10th ACM Conference on Computer and Communications Security (CCS '03); ACM Press 2003, 62-72.
  • 11
    • 84888289118 scopus 로고    scopus 로고
    • http://www.omnetpp.org/filemgmt/viewcat.php?cid=2
  • 12
    • 51249100419 scopus 로고    scopus 로고
    • An Efficient RSU-aided Message Authentication Scheme in Vehicular Communication Networks
    • Beijing, China, May 19-23
    • Zhang, C.; Lin, X.; Lu, R. RAISE: An Efficient RSU-aided Message Authentication Scheme in Vehicular Communication Networks. In IEEE International Conference on Communications (ICC'08), Beijing, China, May 19-23, 2008, 5.
    • (2008) IEEE International Conference on Communications (ICC'08) , pp. 5
    • Zhang, C.1    Lin, X.2    Lu3    RAISE, R.4
  • 13
    • 33750029023 scopus 로고    scopus 로고
    • On the Security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Security and cryptography for networks
    • Maiori, Italy, September 6-8, Springer-Verlag: Berlin
    • Kim, J.; Biryukov, A.; Preneel, B; Hong, S. On the Security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Security and cryptography for networks. In 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006; Springer-Verlag: Berlin, 2006, 4116, 242-256.
    • (2006) 5th International Conference, SCN 2006 , vol.4116 , pp. 242-256
    • Kim, J.1    Biryukov, A.2    Preneel, B.3    Hong, S.4
  • 14
    • 84876663509 scopus 로고    scopus 로고
    • FIPS 180-1. Secure Hash Standard, NIST, U.S. Department of Commerce Washington, D.C., 1995, 4.
    • FIPS 180-1. Secure Hash Standard, NIST, U.S. Department of Commerce Washington, D.C., 1995, 4.
  • 15
    • 79953067606 scopus 로고    scopus 로고
    • Secure Hash standard (SHS)
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology. Secure Hash standard (SHS). Federal Information Processing Standards Publication 180-2, 2002, 8.
    • (2002) Federal Information Processing Standards Publication , vol.180 -2 , pp. 8
  • 16
    • 0002431508 scopus 로고
    • The ALOHA system another alternative for computer communications
    • Abramson, N. The ALOHA system another alternative for computer communications. In AFIPS Conference Proceedings 1970, 37, 695-702
    • (1970) AFIPS Conference Proceedings , vol.37 , pp. 695-702
    • Abramson, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.