메뉴 건너뛰기




Volumn 4, Issue 1, 2009, Pages 140-150

SMOCK: A scalable method of cryptographic key management for mission-critical wireless ad-hoc networks

Author keywords

Combinatorial key management; Security in ubiquitous computing

Indexed keywords

ACCESS CONTROL; AD HOC NETWORKS; AUTHENTICATION; HEALTH CARE; MANAGEMENT; NETWORK MANAGEMENT; SECURITY OF DATA; TELECOMMUNICATION NETWORKS; UBIQUITOUS COMPUTING; WIRELESS AD HOC NETWORKS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 60449084386     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.2009601     Document Type: Article
Times cited : (35)

References (26)
  • 3
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Netw. Mag., vol. 13, no. 6, pp. 24-30, Nov. 1999.
    • (1999) IEEE Netw. Mag , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 4
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Mar
    • J. Douceur, "The sybil attack," in Proc. IPTPS Workshop, Mar. 2002, pp. 251-260.
    • (2002) Proc. IPTPS Workshop , pp. 251-260
    • Douceur, J.1
  • 7
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Jan./Mar
    • S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52-64, Jan./Mar. 2003.
    • (2003) IEEE Trans. Mobile Comput , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.-P.3
  • 9
    • 84943517115 scopus 로고    scopus 로고
    • On the utility of distributed cryptography in P2P and MANETs: The case of membership control?
    • Nov
    • M. Narasimha, G. Tsudik, and J. H. Yi, "On the utility of distributed cryptography in P2P and MANETs: The case of membership control?," in Proc. 11th IEEE Int. Conf. Network Protocols, Nov. 2003, pp. 336-345.
    • (2003) Proc. 11th IEEE Int. Conf. Network Protocols , pp. 336-345
    • Narasimha, M.1    Tsudik, G.2    Yi, J.H.3
  • 10
    • 18244376871 scopus 로고    scopus 로고
    • Efficient and robust key management for large mobile ad-hoc networks
    • Jul
    • B. Zhu, F. Bao, R. H. Deng, M. S. Kankanhalli, and G. Wang, "Efficient and robust key management for large mobile ad-hoc networks," Comput. Netw. J., vol. 48, no. 4, pp. 657-682, Jul. 2005.
    • (2005) Comput. Netw. J , vol.48 , Issue.4 , pp. 657-682
    • Zhu, B.1    Bao, F.2    Deng, R.H.3    Kankanhalli, M.S.4    Wang, G.5
  • 11
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. Comput , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 13
    • 17144398990 scopus 로고    scopus 로고
    • MOCA: Mobile certificate authority for wireless ad hoc networks
    • presented at the, Gaithersburg, MD, Apr
    • S. Yi and R. Kravets, "MOCA: Mobile certificate authority for wireless ad hoc networks," presented at the 2nd Annu. PKI Research Workshop, Gaithersburg, MD, Apr. 2003.
    • (2003) 2nd Annu. PKI Research Workshop
    • Yi, S.1    Kravets, R.2
  • 14
    • 33646839571 scopus 로고    scopus 로고
    • Combinatorial design of key distribution mechanisms for wireless sensor networks
    • S.A. Camtepe and B. Yener, "Combinatorial design of key distribution mechanisms for wireless sensor networks," in Proc. 9th Eur. Symp. Research in Computer Security, 2004, pp. 346-358.
    • (2004) Proc. 9th Eur. Symp. Research in Computer Security , pp. 346-358
    • Camtepe, S.A.1    Yener, B.2
  • 20
    • 39049083533 scopus 로고    scopus 로고
    • Threshold key-establishment in distributed sensor networks using a multivariate scheme
    • Apr
    • F. Delgosha and F. Fekri, "Threshold key-establishment in distributed sensor networks using a multivariate scheme," in Proc. IEEE 25th INFOCOM, Apr. 2006, pp. 1-12.
    • (2006) Proc. IEEE 25th INFOCOM , pp. 1-12
    • Delgosha, F.1    Fekri, F.2
  • 23
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
    • presented at the, Santa Clara, CA, Oct
    • D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," presented at the 1st IEEE Int. Conf. Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, Oct. 2004.
    • (2004) 1st IEEE Int. Conf. Sensor and Ad Hoc Communications and Networks
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 24
    • 33646569085 scopus 로고    scopus 로고
    • Sizzle: A standards-based end-to-end security architecture for the embedded internet
    • V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. Chang, "Sizzle: A standards-based end-to-end security architecture for the embedded internet," in. Proc. 3rd IEEE Percom, 2005, pp. 247-256.
    • (2005) Proc. 3rd IEEE Percom , pp. 247-256
    • Gupta, V.1    Millard, M.2    Fung, S.3    Zhu, Y.4    Gura, N.5    Eberle, H.6    Chang, S.7
  • 25
    • 60449110611 scopus 로고    scopus 로고
    • SMOCK: A scalable method of cryptographic key management for mission-critical networks,
    • Comput. Sci, UIUCDCS-R-2006-2734
    • W. He, Y. Huang, K. Nahrstedt, and W. C. Lee, "SMOCK: A scalable method of cryptographic key management for mission-critical networks," UIUC Tech. Rep. Dept. Comput. Sci., UIUCDCS-R-2006-2734.
    • UIUC Tech. Rep. Dept
    • He, W.1    Huang, Y.2    Nahrstedt, K.3    Lee, W.C.4
  • 26
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," Cryptobytes, vol. 5, no. 2, 2002.
    • (2002) Cryptobytes , vol.5 , Issue.2
    • Perrig, A.1    Canetti, R.2    Tygar, D.3    Song, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.