메뉴 건너뛰기




Volumn 5, Issue 8, 2009, Pages 2107-2124

An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks

Author keywords

Ad hoc networks; Elliptic curve cryptography; Mutual authentication; Path key establishment; Security; Wireless sensor networks

Indexed keywords

BACKEND SYSTEM; CLUSTER-BASED; CLUSTERED SENSOR NETWORKS; ELLIPTIC CURVE CRYPTOGRAPHY; KEY ESTABLISHMENTS; MALICIOUS ATTACK; MUTUAL AUTHENTICATION; NODE-TO-NODE COMMUNICATION; PAIRWISE KEY; PATH KEY ESTABLISHMENT; POWER CONSERVATION; SECURE COMMUNICATIONS; SECURITY; SECURITY AND PERFORMANCE; SECURITY APPROACH; SINK NODES;

EID: 69949155644     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (56)

References (35)
  • 2
    • 25844435733 scopus 로고    scopus 로고
    • Pike: Peer intermediaries for key establishment in sensor networks
    • H. Chan and A. Perrig, PIKE: peer intermediaries for key establishment in sensor networks, Proceedings of IEEE INFOCOM, pp. 13-17, 2005.
    • (2005) Proceedings of IEEE INFOCOM , pp. 13-17
    • Chan, H.1    Perrig, A.2
  • 4
    • 34250659309 scopus 로고    scopus 로고
    • Key management for long-lived sensor networks in hostile environments
    • M. Chorzempa, J.-M. Park and M. Eltoweissy, Key management for long-lived sensor networks in hostile environments, Computer Communications, vol. 30, no. 9, pp. 1964-1979, 2007.
    • (2007) Computer Communications , vol.30 , Issue.9 , pp. 1964-1979
    • Chorzempa, M.1    Park, J.-M.2    Eltoweissy, M.3
  • 5
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Advances in Cryptology, CRYPTO'98, pp. 13-25, 1998.
    • (1998) Advances in Cryptology, CRYPTO'98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 6
    • 46749158359 scopus 로고    scopus 로고
    • An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks
    • A. K. Das, An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks, International Journal of Network Security, vol. 6, no. 2, pp. 129-139, 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.2 , pp. 129-139
    • Das, A.K.1
  • 8
    • 69949134676 scopus 로고    scopus 로고
    • Authenticated reliable and semi-reliable communication in wireless sensor networks
    • F. Dressier, Authenticated reliable and semi-reliable communication in wireless sensor networks, International Journal of Network Security, vol. 7, no. 1, pp. 62-69, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.1 , pp. 62-69
    • Dressier, F.1
  • 10
    • 10644250089 scopus 로고    scopus 로고
    • Security considerations in ad hoc sensor networks
    • F. Hu and N. K. Sharma, Security considerations in ad hoc sensor networks, Ad Hoc Networks, vol. 3, no. 1, pp. 69-89, 2005.
    • (2005) Ad Hoc Networks , vol.3 , Issue.1 , pp. 69-89
    • Hu, F.1    Sharma, N.K.2
  • 11
    • 33749602100 scopus 로고    scopus 로고
    • Scalable security in wireless sensor and actuator networks (WSANs): Integration re-keying with routing
    • F. Hu, W. Siddiqui and K. Sankar, Scalable security in wireless sensor and actuator networks (WSANs): Integration re-keying with routing, Computer Networks, vol. 51, no. 1, pp. 285-308, 2007.
    • (2007) Computer Networks , vol.51 , Issue.1 , pp. 285-308
    • Hu, F.1    Siddiqui, W.2    Sankar, K.3
  • 13
  • 15
    • 33750008721 scopus 로고    scopus 로고
    • Self-healing group key distribution with time-limited node revocation for wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.007, PII S1570870506000448, Security Issues in Sensor and Ad Hoc Networks
    • Y. Jiang, C. Lin, M. Shi and X. Shen, Self-healing group key distribution with time-limited node revocation for wireless sensor networks, Ad Hoc Networks, vol. 5, no. 1, pp. 14-23, 2007. (Pubitemid 44573003)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 14-23
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen X.(S.)4
  • 16
    • 33845869923 scopus 로고    scopus 로고
    • Analysis and evaluation of SECOS, a protocol for energy efficient and secure communication in sensor networks
    • I. Khalil, S. Bagchi and N. Shroff, Analysis and evaluation of SECOS, a protocol for energy efficient and secure communication in sensor networks, Ad Hoc Networks, vol. 5, no. 3, pp. 360-391, 2007.
    • (2007) Ad Hoc Networks , vol.5 , Issue.3 , pp. 360-391
    • Khalil, I.1    Bagchi, S.2    Shroff, N.3
  • 17
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • K. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, K.1
  • 18
    • 0348003132 scopus 로고    scopus 로고
    • Alfred menezes and scott vanstone, the state of elliptic curve cryptography
    • N. Koblitz, Alfred Menezes and Scott Vanstone, The state of elliptic curve cryptography, Designs, Codes and Cryptography, vol. 19, no. 2-3, pp. 173-193, 2000.
    • (2000) Designs, Codes and Cryptography , vol.19 , Issue.2-3 , pp. 173-193
    • Koblitz, N.1
  • 19
    • 34547877223 scopus 로고    scopus 로고
    • Secure communications for cluster-based ad hoc networks using node identities
    • J.-S. Lee and C.-C. Chang, Secure communications for cluster-based ad hoc networks using node identities, Journal of Network and Computer Applications, vol. 30, no. 4, pp. 1377-1396, 2007.
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.4 , pp. 1377-1396
    • Lee, J.-S.1    Chang, C.-C.2
  • 21
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Lecture Notes in Computer Science
    • V. S. Miller, Use of elliptic curves in cryptography, Advances in Cryptology, CRYPTO'85, Lecture Notes in Computer Science, vol. 218, pp. 417-426, 1985.
    • (1985) Advances in Cryptology, CRYPTO'85 , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 25
    • 51149111739 scopus 로고    scopus 로고
    • Fault classification based upon self organizing feature maps and dynamic principal component analysis for inertial sensor drift
    • H. B. Perez, F. Garcia-Nocetti and H. Thompson, Fault classification based upon self organizing feature maps and dynamic principal component analysis for inertial sensor drift, International Journal of Innovative Computing, Information and Control, vol. 3, no. 2, pp. 257-276, 2007.
    • (2007) International Journal of Innovative Computing, Information and Control , vol.3 , Issue.2 , pp. 257-276
    • Perez, H.B.1    Garcia-Nocetti, F.2    Thompson, H.3
  • 26
    • 37349060385 scopus 로고    scopus 로고
    • Detecting and evading wormholes in mobile ad-hoc wireless networks
    • A. A. Pirzada and C. McDonald, Detecting and evading wormholes in mobile ad-hoc wireless networks, International Journal of Network Security, vol. 3, no. 2, pp. 191-202, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.2 , pp. 191-202
    • Pirzada, A.A.1    McDonald, C.2
  • 28
    • 34548043438 scopus 로고    scopus 로고
    • Pair-wise path key establishment in wireless sensor networks
    • J.-P. Sheu and J.-C. Cheng, Pair-wise path key establishment in wireless sensor networks, Computer Communications, vol. 30, no. 11-12, pp. 2365-2374, 2007.
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2365-2374
    • Sheu, J.-P.1    Cheng, J.-C.2
  • 29
    • 33845719807 scopus 로고    scopus 로고
    • EHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks
    • W.-T. Su, K.-M. Chang and Y.-H. Kuo, eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks, Computer Networks, vol. 51, no. 4, pp. 1151-1168, 2007.
    • (2007) Computer Networks , vol.51 , Issue.4 , pp. 1151-1168
    • Su, W.-T.1    Chang, K.-M.2    Kuo, Y.-H.3
  • 31
  • 33
    • 34547743395 scopus 로고    scopus 로고
    • A hierarchical key management scheme for secure group communications in mobile ad hoc networks
    • N.-C. Wang and S.-Z. Fang, A hierarchical key management scheme for secure group communications in mobile ad hoc networks, Journal of Systems and Software, vol. 80, no. 10, pp. 1667-1677, 2007.
    • (2007) Journal of Systems and Software , vol.80 , Issue.10 , pp. 1667-1677
    • Wang, N.-C.1    Fang, S.-Z.2
  • 34
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
    • Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu and M. Galloway, A survey of key management schemes in wireless sensor networks, Computer Communications, vol. 30, no. 11-12, pp. 2314-2341, 2007. (Pubitemid 47285291)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 35
    • 33750012404 scopus 로고    scopus 로고
    • Access control in wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
    • Y. Zhou, Y. Zhang and Y. Fang, Access control in wireless sensor networks, Ad Hoc Networks, vol. 5, no. 1, pp. 3-13, 2007. (Pubitemid 44573007)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 3-13
    • Zhou, Y.1    Zhang, Y.2    Fang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.