메뉴 건너뛰기




Volumn 7, Issue 6, 2009, Pages 1229-1242

Predistribution and local collaboration-based group rekeying for wireless sensor networks

Author keywords

False message filtering; Group key management; Security; Wireless sensor networks

Indexed keywords

ANALYSIS AND SIMULATIONS; COMPROMISED NODES; DISTRIBUTED GROUPS; FALSE DATA FILTERING; FALSE DATUM; FALSE MESSAGE FILTERING; FILTERING SCHEMES; GROUP KEY MANAGEMENT; GROUP KEYS; GROUP REKEYING; HOSTILE ENVIRONMENTS; NEIGHBORING NODES; NOVEL TECHNIQUES; PRELOAD; SECURITY; SYMMETRIC GROUPS;

EID: 64049117542     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2008.11.004     Document Type: Article
Times cited : (27)

References (26)
  • 1
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • October
    • H. Chan, A. Perrig, Security and privacy in sensor networks, in: IEEE Computer, October 2003.
    • (2003) IEEE Computer
    • Chan, H.1    Perrig, A.2
  • 4
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • March
    • F. Ye, H. Luo, S. Lu, L. Zhang, Statistical en-route filtering of injected false data in sensor networks, in: IEEE Infocom'04, March 2004.
    • (2004) IEEE Infocom'04
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 5
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • August
    • S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: ACM MobiCom, August 2000.
    • (2000) ACM MobiCom
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 9
    • 64049106359 scopus 로고    scopus 로고
    • D. Wallner, E. Harder, R. Agee, Key management for multicast: issues and architectures
    • D. Wallner, E. Harder, R. Agee, Key management for multicast: issues and architectures.
  • 10
    • 0012943336 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • 98
    • C. Wong, M. Goudaand, S. Lam, Secure group communications using key graphs, in: ACM SIGCOMM'98, 1998.
    • (1998) ACM SIGCOMM
    • Wong, C.1    Goudaand, M.2    Lam, S.3
  • 15
  • 16
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, V. Gligor, A key-management scheme for distributed sensor networks, in: The 9th ACM Conference on Computer and Communications Security, November 2002, pp. 41-47.
    • L. Eschenauer, V. Gligor, A key-management scheme for distributed sensor networks, in: The 9th ACM Conference on Computer and Communications Security, November 2002, pp. 41-47.
  • 23
  • 24
    • 25844473466 scopus 로고    scopus 로고
    • W. Zhang, G. Cao, Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach, in: IEEE INFOCOM, March 2005.
    • W. Zhang, G. Cao, Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach, in: IEEE INFOCOM, March 2005.
  • 26
    • 0003557429 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • No. 0755, TIS Labs at Network Associates Inc, Glenwood, MD, May
    • D. McGrew, A. Sherman, Key establishment in large dynamic groups using one-way function trees, TIS Report No. 0755, TIS Labs at Network Associates Inc., Glenwood, MD, May 1998.
    • (1998) TIS Report
    • McGrew, D.1    Sherman, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.