메뉴 건너뛰기




Volumn 2, Issue 5, 2008, Pages 265-279

An asymmetric key-based security architecture for wireless sensor networks

Author keywords

Architecture; Pseudoinverse; Public key; Sensor

Indexed keywords


EID: 67650216200     PISSN: None     EISSN: 19767277     Source Type: Journal    
DOI: 10.3837/tiis.2008.05.004     Document Type: Article
Times cited : (26)

References (24)
  • 2
    • 33750319005 scopus 로고    scopus 로고
    • Security in Wireless Sensor Networks: Issues and Challenges
    • 20-22 February, Phoenix Park, Korea, pp
    • A.-S.K. Pathan, H.-W. Lee, and C.S. Hong, "Security in Wireless Sensor Networks: Issues and Challenges," Proceedings of 8th IEEE ICACT 2006, Volume II, 20-22 February, Phoenix Park, Korea, pp. 1043-1048, 2006.
    • (2006) Proceedings of 8th IEEE ICACT 2006 , vol.2 , pp. 1043-1048
    • Pathan, A.-S.K.1    Lee, H.-W.2    Hong, C.S.3
  • 3
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
    • Oct
    • D.J. Malan, M. Welsh, and M.D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," Proceedings of IEEE SECON 2004, pp. 71-80, Oct. 2004.
    • (2004) Proceedings of IEEE SECON 2004 , pp. 71-80
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 7
    • 84862458648 scopus 로고    scopus 로고
    • available at
    • Xbow Sensor Networks, available at: http://www.xbow.com/
    • Xbow Sensor Networks
  • 9
    • 23944459661 scopus 로고    scopus 로고
    • Public Key Cryptography in Sensor Networks-Revisited
    • 3313, Springer-Verlag, pp
    • G. Gaubatz, J.-P. Kaps, and B. Sunar, "Public Key Cryptography in Sensor Networks-Revisited," ESAS 2004, LNCS 3313, Springer-Verlag, pp. 2-18, 2005.
    • (2005) LNCS , vol.ESAS 2004 , pp. 2-18
    • Gaubatz, G.1    Kaps, J.-P.2    Sunar, B.3
  • 12
    • 33646569085 scopus 로고    scopus 로고
    • Sizzle: A Standards-based End-to-End Security Architecture for the Embedded Internet
    • June
    • V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, and S.C. Shantz, "Sizzle: A Standards-based End-to-End Security Architecture for the Embedded Internet," SMLI TR-2005-145, June 2005.
    • (2005) SMLI , vol.TR-2005-145
    • Gupta, V.1    Wurm, M.2    Zhu, Y.3    Millard, M.4    Fung, S.5    Gura, N.6    Eberle, H.7    Shantz, S.C.8
  • 14
    • 34547420699 scopus 로고    scopus 로고
    • How Public Key Cryptography Influences Wireless Sensor Node Lifetime
    • Virginia, USA, pp
    • K. Piotrowski, P. Langendoerfer, and S. Peter, "How Public Key Cryptography Influences Wireless Sensor Node Lifetime," Proceedings of ACM SASN 2006, Virginia, USA, pp. 169-176, 2006.
    • (2006) Proceedings of ACM SASN 2006 , pp. 169-176
    • Piotrowski, K.1    Langendoerfer, P.2    Peter, S.3
  • 16
    • 33750059455 scopus 로고    scopus 로고
    • Cooperative Public Key Authentication Protocol in Wireless Sensor Network
    • 4159, Springer-Verlag, pp
    • D. Nyang and A. Mohaisen, "Cooperative Public Key Authentication Protocol in Wireless Sensor Network," UIC 2006, LNCS 4159, Springer-Verlag, pp. 864-873, 2006.
    • (2006) LNCS , vol.UIC 2006 , pp. 864-873
    • Nyang, D.1    Mohaisen, A.2
  • 18
    • 37849022826 scopus 로고    scopus 로고
    • Applicability of Public Key Infrastructures in Wireless Sensor Networks
    • EuroPKI 2007, Springer-Verlag, pp
    • R. Roman and C. Alcaraz, "Applicability of Public Key Infrastructures in Wireless Sensor Networks," EuroPKI 2007, LNCS 4582, Springer-Verlag, pp. 313-320, 2007.
    • (2007) LNCS , vol.4582 , pp. 313-320
    • Roman, R.1    Alcaraz, C.2
  • 19
    • 67650231576 scopus 로고    scopus 로고
    • Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS,
    • Technical Report 6, July, available at
    • O. Ugus, A. Hessler, and D. Westhoff, "Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS," Technical Report 6, July 2007, available at: http://www.ist-ubisecsens.org/publications/ EcElgamal-UgHesWest.pdf
    • (2007)
    • Ugus, O.1    Hessler, A.2    Westhoff, D.3
  • 20
    • 29844457287 scopus 로고    scopus 로고
    • An Efficient Scheme for Authenticating Public Keys in Sensor Networks
    • Illinois, USA, pp
    • W. Du, R. Wang, and P. Ning, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks," Proceedings of ACM MobiHoc'05, Illinois, USA, pp. 58-67, 2005.
    • (2005) Proceedings of ACM MobiHoc'05 , pp. 58-67
    • Du, W.1    Wang, R.2    Ning, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.