메뉴 건너뛰기




Volumn 5888 LNCS, Issue , 2009, Pages 154-173

Blink 'em all: Scalable, user-friendly and secure initialization of wireless sensor nodes

Author keywords

Authentication; Key Distribution; Wireless Sensor Networks

Indexed keywords

COMMUNICATION CHANNEL; COMPUTER USERS; INPUT AND OUTPUTS; KEY DISTRIBUTION; KEY PRE-DISTRIBUTION; MANUFACTURING PROCESS; NOVEL METHODS; OUT-OF-BAND; OUTPUT INTERFACE; PERSONAL AREA NETWORKS; SENSOR MOTES; SHARED SECRETS; USABILITY STUDIES; USER-CENTRIC; WIRELESS SENSOR NODE;

EID: 71549154378     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10433-6_11     Document Type: Conference Paper
Times cited : (13)

References (40)
  • 3
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 453. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 453
    • Canetti, R.1    Krawczyk, H.2
  • 4
    • 77953853641 scopus 로고    scopus 로고
    • Castelluccia, C., Mutaf, P.: Shake them up!: a movement-based pairing protocol for cpuconstrained devices. In: International Conference on Mobile Systems, Applications, and Services (MobiSys) (2005)
    • Castelluccia, C., Mutaf, P.: Shake them up!: a movement-based pairing protocol for cpuconstrained devices. In: International Conference on Mobile Systems, Applications, and Services (MobiSys) (2005)
  • 7
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • March
    • Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM 2004 (March 2004)
    • (2004) IEEE INFOCOM 2004
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4    Varshney, P.5
  • 10
    • 0346271799 scopus 로고    scopus 로고
    • Beyond the five-user assumption: Benefits of increased sample sizes in usability testing
    • Faulkner, L.: Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers 35(3), 379-383 (2003)
    • (2003) Behavior Research Methods, Instruments, & Computers , vol.35 , Issue.3 , pp. 379-383
    • Faulkner, L.1
  • 13
    • 84945588227 scopus 로고    scopus 로고
    • Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, 2201, p. 116. Springer, Heidelberg (2001)
    • Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 116. Springer, Heidelberg (2001)
  • 14
    • 10644250089 scopus 로고    scopus 로고
    • Security considerations in ad hoc sensor networks
    • Hu, F., Sharma, N.: Security considerations in ad hoc sensor networks. Ad Hoc Networks 3 (2005)
    • (2005) Ad Hoc Networks , vol.3
    • Hu, F.1    Sharma, N.2
  • 16
    • 84885941616 scopus 로고    scopus 로고
    • Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication based on short authenticated strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, 4301, pp. 90-107. Springer, Heidelberg (2006)
    • Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication based on short authenticated strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 90-107. Springer, Heidelberg (2006)
  • 17
    • 26444533861 scopus 로고    scopus 로고
    • Are You with Me? - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person
    • Pervasive
    • Lester, J., Hannaford, B., Borriello, G.: Are You with Me? - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person. In: International Conference on Pervasive Computing ( Pervasive) (2004)
    • (2004) International Conference on Pervasive Computing
    • Lester, J.1    Hannaford, B.2    Borriello, G.3
  • 18
    • 51249087814 scopus 로고    scopus 로고
    • Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
    • Liu, A., Ning, P.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In: Information Processing in Sensor Networks (IPSN) (2008)
    • (2008) Information Processing in Sensor Networks (IPSN)
    • Liu, A.1    Ning, P.2
  • 21
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. IEEE Security & Privacy (2005)
    • (2005) IEEE Security & Privacy
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 22
    • 33746764996 scopus 로고    scopus 로고
    • Wireless sensor networks for personal health monitoring: Issues and an implementation
    • Milenkovic, A., Otto, C., Jovanov, E.: Wireless sensor networks for personal health monitoring: Issues and an implementation. Computer Communications 29(13-14), 2521-2533 (2006)
    • (2006) Computer Communications , vol.29 , Issue.13-14 , pp. 2521-2533
    • Milenkovic, A.1    Otto, C.2    Jovanov, E.3
  • 23
    • 33745832230 scopus 로고    scopus 로고
    • Pasini, S., Vaudenay, S.: SAS-based authenticated key agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 395-409. Springer, Heidelberg (2006)
    • Pasini, S., Vaudenay, S.: SAS-based authenticated key agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 395-409. Springer, Heidelberg (2006)
  • 26
    • 45749134695 scopus 로고    scopus 로고
    • Prasad, R., Saxena, N.: Efficient device pairing using human-comparable audiovisual patterns. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, 5037, pp. 328-345. Springer, Heidelberg (2008)
    • Prasad, R., Saxena, N.: Efficient device pairing using human-comparable audiovisual patterns. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 328-345. Springer, Heidelberg (2008)
  • 30
    • 57049123749 scopus 로고    scopus 로고
    • Automated device pairing for asymmetric pairing scenarios
    • Chen, L, Ryan, M.D, Wang, G, eds, ICICS 2008, Springer, Heidelberg
    • Saxena, N., Uddin, B.: Automated device pairing for asymmetric pairing scenarios. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 311-327. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5308 , pp. 311-327
    • Saxena, N.1    Uddin, B.2
  • 31
    • 0033682228 scopus 로고    scopus 로고
    • Schneiderman, H., Kanade, T.: A statistical method for 3d object detection applied to faces and cars. In: IEEE Conference on Computer Vision and Pattern Recognition (June 2000)
    • Schneiderman, H., Kanade, T.: A statistical method for 3d object detection applied to faces and cars. In: IEEE Conference on Computer Vision and Pattern Recognition (June 2000)
  • 34
    • 56649100493 scopus 로고    scopus 로고
    • Soriente, C., Tsudik, G., Uzun, E.: HAPADEP: Human-assisted pure audio device pairing. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, 5222, pp. 385-400. Springer, Heidelberg (2008)
    • Soriente, C., Tsudik, G., Uzun, E.: HAPADEP: Human-assisted pure audio device pairing. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 385-400. Springer, Heidelberg (2008)
  • 35
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Security Protocols Workshop (1999)
    • (1999) Security Protocols Workshop
    • Stajano, F.1    Anderson, R.J.2
  • 37
    • 38549108892 scopus 로고    scopus 로고
    • Usability analysis of secure pairing methods
    • Dietrich, S, Dhamija, R, eds, FC 2007 and USEC 2007, Springer, Heidelberg
    • Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 307-324. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4886 , pp. 307-324
    • Uzun, E.1    Karvonen, K.2    Asokan, N.3
  • 38
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 309-326
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.