메뉴 건너뛰기




Volumn , Issue , 2009, Pages 29-36

A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks

Author keywords

Key distribution; Multiphase sensor networks; Node capture attacks; Resiliency; Sensor network security

Indexed keywords

DEPLOYMENT KNOWLEDGE; ESSENTIAL PROBLEMS; KEY DISTRIBUTION; KEY PRE-DISTRIBUTION; MULTIPHASE SENSORS; NODE CAPTURE ATTACK; NODE CAPTURE ATTACKS; PAIRWISE KEY; SECURITY IN WIRELESS SENSOR NETWORKS; SELF-HEALING PROPERTIES; SENSOR FIELDS; ZONE-BASED;

EID: 74049100876     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1641944.1641951     Document Type: Conference Paper
Times cited : (20)

References (12)
  • 5
    • 34548396246 scopus 로고    scopus 로고
    • Huang, D. and Medhi, D. 2007. Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. ACM Trans. Sen. Netw. 3(3), 16, Aug. 2007, DOI= http://doi.acm.org/10.1145/1267060.1267064
    • Huang, D. and Medhi, D. 2007. "Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach". ACM Trans. Sen. Netw. 3(3), 16, Aug. 2007, DOI= http://doi.acm.org/10.1145/1267060.1267064
  • 6
    • 77952409570 scopus 로고    scopus 로고
    • Li, G., Ling, H., and Znati, T. 2005. Path key establishment using multiple secured paths in wireless sensor networks. In Proceedings of CoNEXT '05 - the 2005 ACM Conference on Emerging Network Experiment and Technology, pp. 43-49. DOI= http://doi.acm.org/10.1145/1095921.1095928
    • Li, G., Ling, H., and Znati, T. 2005. "Path key establishment using multiple secured paths in wireless sensor networks". In Proceedings of CoNEXT '05 - the 2005 ACM Conference on Emerging Network Experiment and Technology, pp. 43-49. DOI= http://doi.acm.org/10.1145/1095921.1095928
  • 7
    • 32144450809 scopus 로고    scopus 로고
    • Lei, W., Zhi-ping, C., and Xin-hua, J. 2005. Researches on scheme of pairwise key establishment for distributed sensor networks. WMuNeP '05 - 1st ACM Workshop on Wireless Multimedia Networking and Performance Modeling,. pp. 54-61. DOI= http://doi.acm.org/10.1145/1089737.1089747
    • Lei, W., Zhi-ping, C., and Xin-hua, J. 2005. "Researches on scheme of pairwise key establishment for distributed sensor networks". WMuNeP '05 - 1st ACM Workshop on Wireless Multimedia Networking and Performance Modeling,. pp. 54-61. DOI= http://doi.acm.org/10.1145/1089737.1089747
  • 8
    • 42149172778 scopus 로고    scopus 로고
    • Liu, D., Ning, P., and Du, W. 2008. Group-based key predistribution for wireless sensor networks. ACM Trans. Sen. Netw. 4(2), Mar. 2008, pp. 1-30. DOI= http://doi.acm.org/10.1145/1340771.1340777
    • Liu, D., Ning, P., and Du, W. 2008. "Group-based key predistribution for wireless sensor networks". ACM Trans. Sen. Netw. 4(2), Mar. 2008, pp. 1-30. DOI= http://doi.acm.org/10.1145/1340771.1340777
  • 9
    • 34247401809 scopus 로고    scopus 로고
    • Liu, F., Rivera, J. and Cheng, X. 2006. Location-aware key establishment in wireless sensor networks. In Proceedings of IWCMC '06 - International Conference on Wireless Communications and Mobile Computing, pp. 21-26. DOI= http://doi.acm.org/10.1145/1143549.1143556
    • Liu, F., Rivera, J. and Cheng, X. 2006. "Location-aware key establishment in wireless sensor networks". In Proceedings of IWCMC '06 - International Conference on Wireless Communications and Mobile Computing, pp. 21-26. DOI= http://doi.acm.org/10.1145/1143549.1143556
  • 11
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • November
    • Lamport, L. 1981. "Password Authentication with Insecure Communication". Commun. of the ACM, 24(11), November 1981, pp. 770-772.
    • (1981) Commun. of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 12
    • 15244360279 scopus 로고    scopus 로고
    • An Efficient Key Predistribution Scheme for Ad Hoc Network Security
    • March
    • Ramkumar, M. and Memon, N. 2005. "An Efficient Key Predistribution Scheme for Ad Hoc Network Security". IEEE Journal on Selected Areas of Communication, 23(3), March 2005, pp 611-621.
    • (2005) IEEE Journal on Selected Areas of Communication , vol.23 , Issue.3 , pp. 611-621
    • Ramkumar, M.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.