메뉴 건너뛰기




Volumn 3, Issue 6, 2008, Pages 13-28

Analysis of proposed key establishment protocols in multi-tiered sensor networks

Author keywords

Cryptography; Key distribution; Network security; Performance; Wireless sensors

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; NETWORK ARCHITECTURE; NETWORK SECURITY; RANDOM NUMBER GENERATION; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 63149186377     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.3.6.13-28     Document Type: Article
Times cited : (5)

References (43)
  • 3
    • 78651554547 scopus 로고    scopus 로고
    • Axis, Axis cameras and axis camera station software, http:// www.axis.com/, 2007.
    • Axis, "Axis cameras and axis camera station software," http:// www.axis.com/, 2007.
  • 6
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • June
    • L. Gong, "Increasing availability and security of an authentication service," IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 657-662, June 1993.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 657-662
    • Gong, L.1
  • 7
    • 0029513859 scopus 로고
    • Key distribution without individual trusted authentication servers
    • IEEE Computer Society Press, June
    • L. Chen, D. Gollmann, and C. J. Mitchell, "Key distribution without individual trusted authentication servers," in 8th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June 1995, pp. 30-36.
    • (1995) 8th IEEE Computer Security Foundations Workshop , pp. 30-36
    • Chen, L.1    Gollmann, D.2    Mitchell, C.J.3
  • 10
    • 47749104834 scopus 로고    scopus 로고
    • Introduction to wireless sensor networks
    • N. Bulusu and S. Jha, Eds. Artech House
    • N. Bulusu, "Introduction to wireless sensor networks," in Wireless Sensor Networks: A Systems Perspective, N. Bulusu and S. Jha, Eds. Artech House, 2005.
    • (2005) Wireless Sensor Networks: A Systems Perspective
    • Bulusu, N.1
  • 11
    • 47749133330 scopus 로고    scopus 로고
    • Crossbow, "Crossbow," http://www.xbow.com/, 2006.
    • (2006) Crossbow
    • Crossbow1
  • 12
    • 78651564788 scopus 로고    scopus 로고
    • GNOME
    • GNOME, "A controller node," http://cmlab.rice.edu/projects /sensors, 2006.
    • (2006) A controller node
  • 14
    • 78651550800 scopus 로고    scopus 로고
    • MANTIS
    • MANTIS, "The mantis contoller node," http://mantis.cs. colorado.edu/, 2006.
    • (2006) The mantis contoller node
  • 15
    • 78651547492 scopus 로고    scopus 로고
    • Sensor-network security, privacy, and fault tolerance
    • N. Bulusu and S. Jha, Eds. Artech House
    • J. Deng, R. Han, and S. Mishra, "Sensor-network security, privacy, and fault tolerance," in Wireless Sensor Networks: A Systems Perspective, N. Bulusu and S. Jha, Eds. Artech House, 2005.
    • (2005) Wireless Sensor Networks: A Systems Perspective
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 22
    • 85028765277 scopus 로고
    • Perfectly-secure key distribution for dynamic conferences,
    • Online, Available
    • C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," Lecture Notes in Computer Science, vol. 740, pp. 471-486, 1993. [Online]. Available: citeseer.ist.psu.edu /blundo95perfectlysecure.html
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 471-486
    • Blundo, C.1    Santis, A.D.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 24
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • IEEE Computer Society Press, Mar
    • H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proceedings of IEEE Infocom. IEEE Computer Society Press, Mar. 2005.
    • (2005) Proceedings of IEEE Infocom
    • Chan, H.1    Perrig, A.2
  • 30
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 31
    • 84976731140 scopus 로고
    • A key distribution protocol using event markers
    • R. K. Bauer, T. A. Berson, and R. J. Feiertag, "A key distribution protocol using event markers," ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 249-255, 1983.
    • (1983) ACM Trans. Comput. Syst , vol.1 , Issue.3 , pp. 249-255
    • Bauer, R.K.1    Berson, T.A.2    Feiertag, R.J.3
  • 32
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D. Otway and O. Rees, "Efficient and timely mutual authentication," SIGOPS Oper. Syst. Rev., vol. 21, no. 1, pp. 8-10, 1987.
    • (1987) SIGOPS Oper. Syst. Rev , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 35
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham, "Prudent engineering practice for cryptographic protocols," IEEE Trans. Softw. Eng., vol. 22, no. 1, pp. 6-15, 1996.
    • (1996) IEEE Trans. Softw. Eng , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 36
    • 78651545696 scopus 로고    scopus 로고
    • ISO11770-2, Information technology - security techniques - key management - part 2: Mechanisms using symmetric techniques iso/iec 11770-2, 1996.
    • ISO11770-2, "Information technology - security techniques - key management - part 2: Mechanisms using symmetric techniques iso/iec 11770-2," 1996.
  • 38
    • 0029368205 scopus 로고
    • Secure and minimal protocols for authenticated key distribution
    • September
    • P. Janson and G. Tsudik, "Secure and minimal protocols for authenticated key distribution," Computer Communications, vol. 18, no. 9, pp. 645-653, September 1995.
    • (1995) Computer Communications , vol.18 , Issue.9 , pp. 645-653
    • Janson, P.1    Tsudik, G.2
  • 39
    • 33646180371 scopus 로고    scopus 로고
    • On session key construction in provably-secure key establishment protocols
    • Springer
    • K.-K. R. Choo, C. Boyd, and Y. Hitchcock, "On session key construction in provably-secure key establishment protocols." in Mycrypt. Springer, 2005, pp. 116-131.
    • (2005) Mycrypt , pp. 116-131
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.