메뉴 건너뛰기




Volumn , Issue , 2009, Pages 237-244

Collaborative authentication in unattended WSNs

Author keywords

Authentication; Mobile adversary; Wireless sensor networks

Indexed keywords

CRYPTOGRAPHIC PRIMITIVES; DATA AUTHENTICATION; KEY EVOLUTION; MOBILE ADVERSARY; NETWORK DESIGNER; OFF-LOAD; SECURITY ANALYSIS; SENSOR FAILURE; UNATTENDED SENSORS;

EID: 70349251527     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1514274.1514307     Document Type: Conference Paper
Times cited : (41)

References (22)
  • 1
    • 13944283393 scopus 로고    scopus 로고
    • A survey on routing protocols for wireless sensor networks
    • K. Akkaya and M. F. Younis. A survey on routing protocols for wireless sensor networks Ad Hoc Networks, 3(3):325-349, 2005
    • (2005) Ad Hoc Networks , vol.3 , Issue.3 , pp. 325-349
    • Akkaya, K.1    Younis, M.F.2
  • 2
    • 0001229355 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • M. Bellare and S. Miner. A forward-secure digital signature scheme. In CRYPTO 1999
    • (1999) CRYPTO
    • Bellare, M.1    Miner, S.2
  • 4
    • 1542317846 scopus 로고    scopus 로고
    • An authentication framework for hierarchical ad hoc sensor networks
    • M. Bohge and W. Trappa. An authentication framework for hierarchical ad hoc sensor networks. In ACM Workshop on Wireless Security, 2003.
    • (2003) ACM Workshop on Wireless Security
    • Bohge, M.1    Trappa, W.2
  • 5
    • 65249169987 scopus 로고    scopus 로고
    • Posh: Proactive co-operative self-healing in unattended wireless sensor networks
    • R. Di Pietro, D. Ma, C. Soriente, and G. Tsudik. Posh: Proactive co-operative self-healing in unattended wireless sensor networks. In IEEE SEDS, 2008.
    • (2008) IEEE SEDS
    • Di Pietro, R.1    Ma, D.2    Soriente, C.3    Tsudik, G.4
  • 7
    • 70349238414 scopus 로고    scopus 로고
    • Playing hide-and seek with a focused mobile adversary. Cryptology ePrint Archive
    • Report 2008/293
    • R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi, and G. Tsudik. Playing hide-and seek with a focused mobile adversary. Cryptology ePrint Archive, Report 2008/293, 2008
    • (2008)
    • Di Pietro, R.1    Mancini, L.2    Soriente, C.3    Spognardi, A.4    Tsudik, G.5
  • 8
    • 79955515260 scopus 로고    scopus 로고
    • A generic construction for intrusion-resilient public key encryption
    • Y. Dobis, M. Franklin, J. Katz, A. Miyaji, and M. Yung. A generic construction for intrusion-resilient public key encryption. In CT-RSA, 2004.
    • (2004) CT-RSA
    • Dobis, Y.1    Franklin, M.2    Katz, J.3    Miyaji, A.4    Yung, M.5
  • 10
    • 70349242903 scopus 로고    scopus 로고
    • Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong key-insulated signature schemes. In PKC, 2003
    • Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong key-insulated signature schemes. In PKC, 2003
  • 11
    • 33144472210 scopus 로고    scopus 로고
    • S. Ganeriwal, S. Capkun, C. Han, and M. Srivastava Secure time synchronization service for sensor networks. In WiSe, 2005.
    • S. Ganeriwal, S. Capkun, C. Han, and M. Srivastava Secure time synchronization service for sensor networks. In WiSe, 2005.
  • 12
    • 70349257006 scopus 로고    scopus 로고
    • G. Itkis. Intrusion-resilient signatures: Generic constructions. In SCN, 2002.
    • G. Itkis. Intrusion-resilient signatures: Generic constructions. In SCN, 2002.
  • 13
    • 84871980827 scopus 로고    scopus 로고
    • SiBIR: Signer-base intrusion-resilient signatures
    • G. Itkis and L. Reyzin. SiBIR: Signer-base intrusion-resilient signatures. In CRYPTO, 2002
    • (2002) CRYPTO
    • Itkis, G.1    Reyzin, L.2
  • 14
    • 33749513007 scopus 로고    scopus 로고
    • Practical broadcast authentication in sensor networks
    • D. Liu, P. Ning, S. Zhu, and S. Jajodia. Practical broadcast authentication in sensor networks. In IEEE MobiQuitous, 2005.
    • (2005) IEEE MobiQuitous
    • Liu, D.1    Ning, P.2    Zhu, S.3    Jajodia, S.4
  • 15
    • 84904163618 scopus 로고    scopus 로고
    • Extended abstract: Forword-secure sequential aggregate authentication
    • D. Ma and G. Tsudik. Extended abstract: Forword-secure sequential aggregate authentication. In IEEE S&P, 2007.
    • (2007) IEEE S&P
    • Ma, D.1    Tsudik, G.2
  • 16
    • 70349236707 scopus 로고    scopus 로고
    • DISH: Distributed Self-Healing
    • in Unattended Sensor Networks
    • D. Ma and G. Tsudik. DISH: Distributed Self-Healing (in Unattended Sensor Networks). In SSS, 2008.
    • (2008) In SSS
    • Ma, D.1    Tsudik, G.2
  • 18
    • 29844441128 scopus 로고    scopus 로고
    • Arbaugh Toward resilient security in wireless sensor networks
    • H. Yang, F. Ye, Y. Yuan, S. Lu, and W. A Arbaugh Toward resilient security in wireless sensor networks. In ACM MobiHoc, 2005.
    • (2005) ACM MobiHoc
    • Yang, H.1    Ye, F.2    Yuan, Y.3    Lu, S.4
  • 19
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route filtering of injected false data in sensor networks. In IEEE INFOCOM, 2004.
    • (2004) IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 20
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
    • W. Zhang and G. Cao. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In IEEE INFOCOM, 2005.
    • (2005) IEEE INFOCOM
    • Zhang, W.1    Cao, G.2
  • 21
    • 33847095965 scopus 로고    scopus 로고
    • The interleaved authentication for filtering false reports in multipath routing based sensor networks
    • Y. Zhang J. Yang, and H. T. Vu. The interleaved authentication for filtering false reports in multipath routing based sensor networks. In IPDPS, 2006.
    • (2006) IPDPS
    • Zhang, Y.1    Yang, J.2    Vu, H.T.3
  • 22
    • 34548390509 scopus 로고    scopus 로고
    • Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
    • S. Zhu S. Setia, S. Jajodia, and P. Ning. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN, 3(3) 2007.
    • (2007) TOSN , vol.3 , Issue.3
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.