메뉴 건너뛰기




Volumn 8, Issue 3, 2009, Pages 282-292

Hierarchical grid-based pairwise key pre-distribution in wireless sensor networks

Author keywords

Communication efficiency; Grid network; Key pre distribution; Sensor network security

Indexed keywords

CRYPTOGRAPHY; SENSOR NETWORKS; SENSOR NODES;

EID: 66549130452     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (35)
  • 6
    • 33745969132 scopus 로고    scopus 로고
    • Defending against path-based dos attacks in wireless sensor networks
    • J. Deng, R. Han, and S. Mishra, "Defending against path-based dos attacks in wireless sensor networks, SASN, pp. 89-96, 2005.
    • (2005) SASN , pp. 89-96
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 8
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," INFOCOM, pp. 1-12, 2004.
    • (2004) INFOCOM , pp. 1-12
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 10
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • ACM CCS
    • L. Eschenauer, and V. D. Gligor, "A key-management scheme for distributed sensor networks," ACM CCS, pp. 41-47, 2002.
    • (2002) , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 11
    • 35048818581 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and rsa on 8-bit cpus
    • N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and rsa on 8-bit cpus," CHES, pp. 119-132, 2004.
    • (2004) CHES , pp. 119-132
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 12
    • 14844314204 scopus 로고    scopus 로고
    • Location-aware key management scheme for wireless sensor networks
    • D. Huang, M. Mehta, D. Medhi, and L. Harn, "Location-aware key management scheme for wireless sensor networks," SASN, pp. 29-42, 2004.
    • (2004) SASN , pp. 29-42
    • Huang, D.1    Mehta, M.2    Medhi, D.3    Harn, L.4
  • 13
    • 14844335004 scopus 로고    scopus 로고
    • Revisiting random key pre-distribution schemes for wireless sensor networks
    • J. Hwang, and Y. Kim, "Revisiting random key pre-distribution schemes for wireless sensor networks, SASN, pp. 43-52, 2004.
    • (2004) SASN , pp. 43-52
    • Hwang, J.1    Kim, Y.2
  • 14
    • 33745933645 scopus 로고    scopus 로고
    • A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
    • T. Ito, H. Ohta, N. Matsuda, and T. Yoneda, "A key pre-distribution scheme for secure sensor networks using probability density function of node deployment," SASN, pp. 69-75, 2005.
    • (2005) SASN , pp. 69-75
    • Ito, T.1    Ohta, H.2    Matsuda, N.3    Yoneda, T.4
  • 17
    • 0034548432 scopus 로고    scopus 로고
    • A scalable location service for geographic ad hoc routing
    • J. Li, J. Jannotti, D. S. J. D. Couto, D. R. Karger, and R. Morris, "A scalable location service for geographic ad hoc routing," MOBICOM, pp. 120-130, 2000.
    • (2000) MOBICOM , pp. 120-130
    • Li, J.1    Jannotti, J.2    Couto, D.S.J.D.3    Karger, D.R.4    Morris, R.5
  • 18
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • D. Liu, and P. Ning, "Establishing pairwise keys in distributed sensor networks," ACM CCS, pp. 52-61, 2003.
    • (2003) ACM CCS , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 22
    • 54249109581 scopus 로고    scopus 로고
    • On the grid based key pre-distribution: Toward a better connectivity in wireless sensor networks
    • to appear
    • A. Mohaisen, Y. Maeng, and D. Nyang, "On the grid based key pre-distribution: Toward a better connectivity in wireless sensor networks," SSDU 2007, to appear, 2007.
    • (2007) SSDU , vol.2007
    • Mohaisen, A.1    Maeng, Y.2    Nyang, D.3
  • 23
    • 33745569997 scopus 로고    scopus 로고
    • Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
    • A. Mohaisen, and D. Nyang, "Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks," EWSN, pp. 83-98, 2006.
    • (2006) EWSN , pp. 83-98
    • Mohaisen, A.1    Nyang, D.2
  • 24
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: analysis & defenses
    • J. Newsome, E. Shi, D. X. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," IPSN, pp. 259-268, 2004.
    • (2004) IPSN , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.X.3    Perrig, A.4
  • 27
    • 4544301464 scopus 로고    scopus 로고
    • Random key-assignment for secure wireless sensor networks
    • R. D. Pietro, L. V. Mancini, and A. Mei, "Random key-assignment for secure wireless sensor networks," SASN, pp. 62-71, 2003.
    • (2003) SASN , pp. 62-71
    • Pietro, R.D.1    Mancini, L.V.2    Mei, A.3
  • 28
    • 33745656073 scopus 로고    scopus 로고
    • E±cient and resilient key discovery based on pseudo-random key pre-deployment
    • R. D. Pietro, L. V. Mancini, and A. Mei, "Efficient and resilient key discovery based on pseudo-random key pre-deployment," IPDPS, pp. 217-227, 2004.
    • (2004) "IPDPS , pp. 217-227
    • Pietro, R.D.1    Mancini, L.V.2    Mei, A.3
  • 29
    • 84976664565 scopus 로고
    • A method for obtaining digital signatures and public-key crypto-systems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key crypto-systems," CACM, vol. 26, no. 1, pp. 96-99, 1983.
    • (1983) CACM , vol.26 , Issue.1 , pp. 96-99
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 30
    • 23944447698 scopus 로고    scopus 로고
    • A security architecture for mobile wireless sensor networks
    • S. Schmidt, H. Krahn, S. Fischer, and D. Watjen, "A security architecture for mobile wireless sensor networks," ESAS, pp. 166-177, 2004.
    • (2004) ESAS , pp. 166-177
    • Schmidt, S.1    Krahn, H.2    Fischer, S.3    Watjen, D.4
  • 31
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communication of ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communication of ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 33
    • 33646581008 scopus 로고    scopus 로고
    • Energy analysis of public-key cryptography for wireless sensor networks
    • A. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," PerCom, pp. 324-328, 2005.
    • (2005) PerCom , pp. 324-328
    • Wander, A.1    Gura, N.2    Eberle, H.3    Gupta, V.4    Shantz, S.C.5
  • 34
  • 35
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.