메뉴 건너뛰기




Volumn , Issue , 2008, Pages 815-820

A framework for confronting key-swapping collusion attack on random pairwise key pre-distribution schemes for distributed sensor networks

Author keywords

Attacks; Countermeasures; Key swapping

Indexed keywords

RADAR COUNTERMEASURES; SENSOR NETWORKS; SENSOR NODES;

EID: 67650697116     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MAHSS.2008.4660126     Document Type: Conference Paper
Times cited : (3)

References (14)
  • 3
    • 67549091275 scopus 로고    scopus 로고
    • Efficient ID-based threshold random key pre-distribution scheme for wireless sensor networks
    • to appear
    • T. T. Dai and C. S. Hong, "Efficient ID-based Threshold Random Key Pre-distribution Scheme for Wireless Sensor Networks", IEICE TRANS. Comm., to appear, 2008.
    • (2008) IEICE TRANS. Comm.
    • Dai, T.T.1    Hong, C.S.2
  • 9
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • DOI 10.1145/1218556.1218559
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks", ACM Trans. Sen. Netw., vol.2, 2006, pp. 500-528. (Pubitemid 46278640)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 10
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach", Proc. IEEE INFOCOM'05, 2005, pp. 503-514. (Pubitemid 41390846)
    • (2005) Proceedings - IEEE INFOCOM , vol.1 , pp. 503-514
    • Zhang, W.1    Cao, G.2
  • 11
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • B. Parno, A. Perrig, and V. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks", Proc. IEEE Symposium on Security and Privacy, 2005, pp. 49-63. (Pubitemid 41543646)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 12
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge", Proc. IEEE INFOCOMV4, 2004, pp. 586-597.
    • (2004) Proc. IEEE INFOCOM'04 , pp. 586-597
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 13
    • 26444506296 scopus 로고    scopus 로고
    • Efficient constructions for one-way hash chains
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • Y. C. Hu, M. Jakobsson, and A. Perrig, "Efficient Constructions for One-Way Hash Chains", Applied Cryptography and Network Security, 2005, pp. 423-441. (Pubitemid 41422131)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 423-441
    • Hu, Y.-C.1    Jakobsson, M.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.