메뉴 건너뛰기




Volumn , Issue , 2009, Pages

An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks

Author keywords

Key management; Key pre distribution; Large scale heterogeneous sensor networks; Polynomial based key distribution; Random pairwise keys scheme; Security

Indexed keywords

KEY MANAGEMENT; KEY PRE-DISTRIBUTION; LARGE-SCALE HETEROGENEOUS SENSOR NETWORKS; POLYNOMIAL-BASED KEY DISTRIBUTION; RANDOM PAIRWISE KEYS SCHEME; SECURITY;

EID: 66549123136     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMSNETS.2009.4808919     Document Type: Conference Paper
Times cited : (31)

References (26)
  • 1
    • 0017930809 scopus 로고
    • METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol.21, pp. 120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 3
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. EIGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol.31, pp. 469-472, July 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • Eigamal, T.1
  • 6
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
    • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks : A survey," Computer Networks, vol.38, no. 4, pp. 393-422, 2002. (Pubitemid 34181630)
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubramaniam, Y.3    Cayirci, E.4
  • 8
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, California
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Security and Privacy, Berkeley, California, 2003, pp. 197-213.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 12
    • 84866860550 scopus 로고    scopus 로고
    • Improving key pre-distribution with deplOYment knowledge in static sensor networks
    • D. Liu and P. Ning, "Improving key pre-distribution with deplOYment knowledge in static sensor networks," ACM Transactions on Sensor Networks, vol.1, no. 2, pp. 204-239, 2005.
    • (2005) ACM Transactions on Sensor Networks , vol.1 , Issue.2 , pp. 204-239
    • Liu, D.1    Ning, P.2
  • 14
    • 33750111807 scopus 로고    scopus 로고
    • An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.011, PII S157087050600045X, Security Issues in Sensor and Ad Hoc Networks
    • Cheng and D. Agrawal, "An improved key distribution mechanism for large-scale hierarchical wireless sensor networks," Ad Hoc Networks (Elsevier), vol.5, no. 1, pp. 35-48, 2007. (Pubitemid 44592580)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 35-48
    • Cheng, Y.1    Agrawal, D.P.2
  • 18
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • DOI 10.1145/1053283.1053287
    • D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Transactions on ltiformation and System Security, vol.8, no. 1, pp. 41-77, 2005. (Pubitemid 40479429)
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Rongfang, L.I.3
  • 23
    • 0022793132 scopus 로고
    • HOW TO CONSTRUCT RANDOM FUNCTIONS.
    • DOI 10.1145/6490.6503
    • O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," Journal of the ACM, vol.33, no. 4, pp. 792-807, October 1986. (Pubitemid 17462444)
    • (1986) Journal of the ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich Oded1    Goldwasser Shafi2    Micali Silvio3
  • 24
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • DOI 10.1145/1218556.1218559
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Transactions on Sensor Networks, vol.2, no. 4, pp. 500-528, November 2006. (Pubitemid 46278640)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 26
    • 78651551984 scopus 로고    scopus 로고
    • Two attacks on a sensor network key distribution scheme of cheng and agrawal
    • report 2008/326. [Online]. Available:
    • M. B. Paterson, R. Holloway, and D. R. Stinson, "Two attacks on a sensor network key distribution scheme of Cheng and Agrawal," in Cryptology ePrint Archive, 2008, report 2008/326. [Online]. Available: http://eprint.iacr.org/2008
    • (2008) Cryptology ePrint Archive
    • Paterson, M.B.1    Holloway, R.2    Stinson, D.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.