메뉴 건너뛰기




Volumn 55, Issue 2, 2009, Pages 492-498

Enhanced novel access control protocol over wireless sensor networks

Author keywords

Access control; Authentication; Key establishment; Sensor network security

Indexed keywords

ACTIVE ATTACK; ELLIPTIC CURVE CRYPTOGRAPHY; HASH CHAINS; KEY ESTABLISHMENT; MALICIOUS ATTACK; NODE DEPLOYMENT; NOVEL ACCESS; REPLAY ATTACK; RESOURCE-CONSTRAINED;

EID: 68949177260     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2009.5174412     Document Type: Article
Times cited : (51)

References (12)
  • 2
    • 34047126869 scopus 로고    scopus 로고
    • P. Baronti, P. Pillai, V. Chook, S. Chessa, A. Gotta, and Y. F. Hu, Wireless sensor networks : A survey on the atate of the art and the 802.15.4 and ZigBee standards, Computer Communications, 30, pp. 1655-1695, 2007.
    • P. Baronti, P. Pillai, V. Chook, S. Chessa, A. Gotta, and Y. F. Hu, "Wireless sensor networks : A survey on the atate of the art and the 802.15.4 and ZigBee standards," Computer Communications, vol. 30, pp. 1655-1695, 2007.
  • 3
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol. 52, no. 12, pp. 2292-2330, 2008.
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 4
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M, Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, vol. 30, pp. 2314-2341, 2007.
    • (2007) Computer Communications , vol.30 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 6
    • 33744899346 scopus 로고    scopus 로고
    • An efficient key pre-distribution scheme for secure distributed sensor network
    • S. J. Choi and H. Y. Youn, "An efficient key pre-distribution scheme for secure distributed sensor network," Lecture Notes in Computer Science, vol. 3823, pp. 197-213, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3823 , pp. 197-213
    • Choi, S.J.1    Youn, H.Y.2
  • 8
    • 33646840476 scopus 로고    scopus 로고
    • A novel key pre-distribution scheme with LU matrix for secure wireless sensor networks
    • C. W. Park, S. J. Choi, and H. Y. Youn, "A novel key pre-distribution scheme with LU matrix for secure wireless sensor networks," Lecture Notes in Artificial Intelligence, vol. 3801, pp. 494-499, 2005.
    • (2005) Lecture Notes in Artificial Intelligence , vol.3801 , pp. 494-499
    • Park, C.W.1    Choi, S.J.2    Youn, H.Y.3
  • 10
    • 0041973497 scopus 로고    scopus 로고
    • A defense against wormhole attacks in wireless networks
    • Y. Hu, A. Perrig, and D. B. Johnson, "A defense against wormhole attacks in wireless networks," IEEE INFOCOM'03, vol. 3, pp. 1976-1986, 2003.
    • (2003) IEEE INFOCOM'03 , vol.3 , pp. 1976-1986
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 11
    • 33750012404 scopus 로고    scopus 로고
    • Access control in wireless sensor networks
    • Y. Zhou, Y. Zhang, and Y. Fang, "Access control in wireless sensor networks," Ad Hoc Networks, vol. 5, pp. 3-13, 2007.
    • (2007) Ad Hoc Networks , vol.5 , pp. 3-13
    • Zhou, Y.1    Zhang, Y.2    Fang, Y.3
  • 12
    • 55849115257 scopus 로고    scopus 로고
    • A novel access control protocol for secure sensor networks
    • H. F. Huang, "A novel access control protocol for secure sensor networks," Computer Standards & Interfaces, vol. 31, pp. 272-276, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 272-276
    • Huang, H.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.