메뉴 건너뛰기




Volumn 5339 LNCS, Issue , 2008, Pages 120-132

A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks

Author keywords

Identity based key agreement; Key distribution; Pairings; Underwater wireless sensor networks

Indexed keywords

BATTERY LIFE; COMMUNICATION BAND WIDTH; IDENTITY-BASED KEY AGREEMENT; KEY DISTRIBUTION; KEY ESTABLISHMENTS; KILLER APPLICATIONS; LOW POWER DEVICES; PAIRINGS; TRANSMISSION MECHANISMS; UNDERWATER WIRELESS SENSOR NETWORKS;

EID: 58449131864     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89641-8_9     Document Type: Conference Paper
Times cited : (24)

References (27)
  • 2
    • 57349193377 scopus 로고    scopus 로고
    • Alcaraz, C., Roman, R.: Applying key infrastructures for sensor networks in cip/ciip scenarios. In: Lopez, J. (ed.) CRITIS 2006. LNCS, 4347, pp. 166-178. Springer, Heidelberg (2006)
    • Alcaraz, C., Roman, R.: Applying key infrastructures for sensor networks in cip/ciip scenarios. In: Lopez, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 166-178. Springer, Heidelberg (2006)
  • 3
    • 0037623983 scopus 로고    scopus 로고
    • Identity-Based encryption from the Weil pairing
    • Boneh, D., Franklin, M.: Identity-Based encryption from the Weil pairing. SIAM Journal of Computing 32(3), 586-615 (2003)
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 5
    • 84868885546 scopus 로고    scopus 로고
    • Atmel Corporation
    • Atmel Corporation. Atmegal28 product description (2007), http://www.atmel.com/dyn/products/product-card.asp?part-id=2018
    • (2007) Atmegal28 product description
  • 8
    • 34247224664 scopus 로고    scopus 로고
    • Key distribution mechanisms for wireless sensor networks: A survey
    • Technical Report TR-05-07, College of William & Mary March
    • Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Technical Report TR-05-07, College of William & Mary (March 2005)
    • (2005)
    • Camtepe, S.A.1    Yener, B.2
  • 10
    • 29244438183 scopus 로고    scopus 로고
    • Provably secure non-interactive key distribution based on pairings
    • Dupont, R., Enge, A.: Provably secure non-interactive key distribution based on pairings. Discrete Applied Mathematics 154(2), 270-276 (2006)
    • (2006) Discrete Applied Mathematics , vol.154 , Issue.2 , pp. 270-276
    • Dupont, R.1    Enge, A.2
  • 11
    • 34748898963 scopus 로고    scopus 로고
    • Grofischädl, J., Szekely, A., Tillich, S.: The energy cost of cryptographic key establishment in wireless sensor networks. In: ASIACCS, pp. 380-382. ACM, New York (2007)
    • Grofischädl, J., Szekely, A., Tillich, S.: The energy cost of cryptographic key establishment in wireless sensor networks. In: ASIACCS, pp. 380-382. ACM, New York (2007)
  • 13
    • 84868872186 scopus 로고    scopus 로고
    • LinkQuest Inc. Underwater acoustic modems
    • LinkQuest Inc. Underwater acoustic modems (2007), http://www.link-quest. com/
    • (2007)
  • 14
    • 84868872187 scopus 로고    scopus 로고
    • Crossbow Technology Inc. Wireless sensor nodes
    • Crossbow Technology Inc. Wireless sensor nodes (2008), http://www.xbow.com/
    • (2008)
  • 17
    • 74549221711 scopus 로고    scopus 로고
    • Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.A.: An efficient protocol for authenticated key agreement. Des. Codes Cryptography 28(2), 119-134 (2003)
    • Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.A.: An efficient protocol for authenticated key agreement. Des. Codes Cryptography 28(2), 119-134 (2003)
  • 19
    • 54949148390 scopus 로고    scopus 로고
    • Prospects and problems of wireless communications for underwater sensor networks. Wireless Communications and Mobile Computing - Special Issue on Underwater Sensor
    • to appear
    • Liu, L., Zhou, S., Cui, J.-H.: Prospects and problems of wireless communications for underwater sensor networks. Wireless Communications and Mobile Computing - Special Issue on Underwater Sensor Networks (to appear, 2008)
    • (2008) Networks
    • Liu, L.1    Zhou, S.2    Cui, J.-H.3
  • 22
    • 53149126145 scopus 로고    scopus 로고
    • Oliveira, L.B., Scott, M., Lopez, J., Dahab, R.: Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. In: 5th International Conference on Networked Sensing Systems (to appear, 2008), http://eprint.iacr.org/2007/482
    • Oliveira, L.B., Scott, M., Lopez, J., Dahab, R.: Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. In: 5th International Conference on Networked Sensing Systems (to appear, 2008), http://eprint.iacr.org/2007/482
  • 23
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • Shamir, A,: Identity-based cryptosystems and signature schemes. In:Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 25
    • 49949100301 scopus 로고    scopus 로고
    • Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: Nanoecc:Testing the limits of elliptic curve cryptography in sensor networks. In:Verdone, R. (ed.) EWSN 2008. LNCS, 4913, pp. 305-320. Springer, Heidelberg (2008)
    • Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: Nanoecc:Testing the limits of elliptic curve cryptography in sensor networks. In:Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
  • 26
    • 23044474013 scopus 로고    scopus 로고
    • Evidence that XTR. is more secure than supersingular elliptic curve cryptosystems
    • Verheul, E.R.: Evidence that XTR. is more secure than supersingular elliptic curve cryptosystems. J. Cryptology 17(4), 277-296 (2004)
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 277-296
    • Verheul, E.R.1
  • 27
    • 58449091942 scopus 로고    scopus 로고
    • Accredited Standards Committee X9. American national standard x9.62-2005, public key cryptography for the financial services industry, the elliptic curve digital signature algorithm (ecdsa) (2005)
    • Accredited Standards Committee X9. American national standard x9.62-2005, public key cryptography for the financial services industry, the elliptic curve digital signature algorithm (ecdsa) (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.