메뉴 건너뛰기




Volumn 5, Issue 2, 2009, Pages 139-157

Multicast encryption infrastructure for security in sensor networks

Author keywords

Group Key Management; Multicast Security; Sensor Network Security

Indexed keywords

BINARY TREES; DETECTORS; INTERNET; MULTICASTING; NETWORK SECURITY; SENSOR NETWORKS; TELECOMMUNICATION EQUIPMENT; WIRELESS SENSOR NETWORKS;

EID: 62349102240     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1080/15501320601062114     Document Type: Article
Times cited : (10)

References (24)
  • 2
    • 4143104126 scopus 로고    scopus 로고
    • Sensor Networks - An Overview
    • April/May
    • Malik Tubaishat and Sanjay Madria, "Sensor Networks - An Overview", IEEE Potentials, vol. 22, no. 2, pp. 20-23, April/May 2003.
    • (2003) IEEE Potentials , vol.22 , Issue.2 , pp. 20-23
    • Tubaishat, M.1    Madria, S.2
  • 3
    • 36248963056 scopus 로고    scopus 로고
    • Data security perspectives
    • eds, S. S. Iyengar and R. R. Brooks, Chapman and Hall, Boca Raton, FLA
    • D. W. Carman, "Data security perspectives," in Distributed Sensor Networks, (eds.) S. S. Iyengar and R. R. Brooks, Chapman and Hall, Boca Raton, FLA, 2005.
    • (2005) Distributed Sensor Networks
    • Carman, D.W.1
  • 4
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • H. Chan and A. Perrig, "Security and privacy in sensor networks," IEEE Computer Magazine, pp. 103-105, 2003.
    • (2003) IEEE Computer Magazine , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 6
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security (final),
    • 00-010, September 1
    • D. W. Carman, P. S. Kraus and B. J. Matt, "Constraints and approaches for distributed sensor network security (final)," NAI Labs Technical Report #00-010, September 1, 2000.
    • (2000) NAI Labs Technical Report
    • Carman, D.W.1    Kraus, P.S.2    Matt, B.J.3
  • 9
    • 33745486852 scopus 로고    scopus 로고
    • S. S. Iyengar and R. R. Brooks, eds, Chapman and Hall, Boca Raton, FL
    • S. S. Iyengar and R. R. Brooks, eds., Distributed Sensor Networks, Chapman and Hall, Boca Raton, FL, 2005.
    • (2005) Distributed Sensor Networks
  • 10
    • 84957096234 scopus 로고    scopus 로고
    • An information theoretic analysis of rooted-tree based secure multicast key distribution schemes
    • August
    • R. Poovendran and J. S. Baras, "An information theoretic analysis of rooted-tree based secure multicast key distribution schemes," Lecture Notes in Computer Science, vol. 1666, pp. 624-638, August 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 624-638
    • Poovendran, R.1    Baras, J.S.2
  • 12
    • 3543119264 scopus 로고    scopus 로고
    • Performance Optimizations for Group Key Management Schemes for Secure Multicast,
    • Technical Report, George Mason University
    • S. Zhu, S. Setia and S. Jajodia, "Performance Optimizations for Group Key Management Schemes for Secure Multicast," Technical Report, George Mason University, 2002.
    • (2002)
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 14
    • 62349141770 scopus 로고    scopus 로고
    • B. Pillai, Network Embedded Support for Sensor Network Security, Masters Thesis, ECE Dept, Clemson University, May 2006.
    • B. Pillai, Network Embedded Support for Sensor Network Security, Masters Thesis, ECE Dept, Clemson University, May 2006.
  • 18
    • 62349131527 scopus 로고    scopus 로고
    • R. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan and M. Kandemir, On the Detection of Clones in Sensor Networks Using Random Key Predistribution, Submitted for review.
    • R. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan and M. Kandemir, "On the Detection of Clones in Sensor Networks Using Random Key Predistribution," Submitted for review.
  • 19
    • 0027610755 scopus 로고
    • The Consensus Problem in Fault-Tolerant Computing
    • June
    • M. Barborak, M. Malek and A. Dahbura, "The Consensus Problem in Fault-Tolerant Computing," ACM Computing Surveys, vol 25, no. 2, pp. 171-220, June 1993.
    • (1993) ACM Computing Surveys , vol.25 , Issue.2 , pp. 171-220
    • Barborak, M.1    Malek, M.2    Dahbura, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.