메뉴 건너뛰기




Volumn 1, Issue , 2009, Pages 41-44

A polynomial based key establishment scheme for heterogeneous sensor networks

Author keywords

Key establishment; Polynomial; Sensor networks

Indexed keywords

COMPROMISED NODES; HETEROGENEOUS SENSOR NETWORKS; KEY ESTABLISHMENT; KEY ESTABLISHMENTS; MULTI-TIERED; NODE CAPTURE ATTACK; PAIRWISE KEY; SECURITY ANALYSIS;

EID: 74049143096     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAS.2009.264     Document Type: Conference Paper
Times cited : (3)

References (13)
  • 2
    • 33750023217 scopus 로고    scopus 로고
    • X. Du and Y. Xiao and M. Guizani and H. H. Chen, An Effective Key Management Scheme for Heterogeneous Sensor Networks, Ad Hoc Networks, 5, no. 1, pp. 24-34, June 2007.
    • X. Du and Y. Xiao and M. Guizani and H. H. Chen, "An Effective Key Management Scheme for Heterogeneous Sensor Networks", Ad Hoc Networks, vol. 5, no. 1, pp. 24-34, June 2007.
  • 3
    • 23244467182 scopus 로고    scopus 로고
    • W. Du and J. Deng and Y. S. Han and P. K. Varshney and A. Khalili, A Pairwise Key Predistribution Scheme for Wireless Sensor Networks, ACM Transactions on Information and System Security, 8, no. 2, pp. 228-258, May 2005.
    • W. Du and J. Deng and Y. S. Han and P. K. Varshney and A. Khalili, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks", ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 228-258, May 2005.
  • 4
    • 34250659309 scopus 로고    scopus 로고
    • Key Management for Long-lived Sensor Networks in Hostile Environments
    • June
    • M. Chorzempa and J. M. Park and M. Eltoweissy, "Key Management for Long-lived Sensor Networks in Hostile Environments", Computer Communications, vol. 30, no. 9, pp. 1964-1979, June 2007.
    • (2007) Computer Communications , vol.30 , Issue.9 , pp. 1964-1979
    • Chorzempa, M.1    Park, J.M.2    Eltoweissy, M.3
  • 5
    • 33144476837 scopus 로고    scopus 로고
    • Location-Based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks
    • February
    • Y. Zhang and W. Liu and W. Lou and Y. Fang, "Location-Based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks", IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247-260, February 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 6
    • 33947309703 scopus 로고    scopus 로고
    • Secure Localization and Authentication in Ultra-wideband Sensor Networks
    • April
    • Y. Zhang and W. Liu and Y. Fang and D. Wu, "Secure Localization and Authentication in Ultra-wideband Sensor Networks", IEEE Journal on Selected Areas in Communications, vol. 24, no. 4, pp. 829-835, April 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.4 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4
  • 7
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security Protocols for Sensor Networks
    • September
    • A. Perrig and R. Szewczyk and J. D. Tygar and V. Wen and D. E. Culler, "SPINS: Security Protocols for Sensor Networks", Wireless Networks, vol. 8, no. 5, pp. 521-534, September 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 8
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
    • November
    • S. Zhu and S. Setia and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks", ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500-528, November 2006.
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 9
    • 16644374371 scopus 로고    scopus 로고
    • Establishing Pairwise Keys in Distributed Sensor Networks
    • February
    • D. Liu and P. Ning and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks", ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41-77, February 2005.
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 10
    • 48049095381 scopus 로고    scopus 로고
    • Exploiting Unidirectional Links for Key Establishment Protocols in Heterogeneous Sensor Networks
    • August
    • Y. Zhang and D. Gu and J. Li, "Exploiting Unidirectional Links for Key Establishment Protocols in Heterogeneous Sensor Networks", Computer Communications, vol. 31, no. 13, pp. 2959-2971, August 2008.
    • (2008) Computer Communications , vol.31 , Issue.13 , pp. 2959-2971
    • Zhang, Y.1    Gu, D.2    Li, J.3
  • 12
  • 13
    • 34547411877 scopus 로고    scopus 로고
    • A Two-Layer Key Establishment Scheme for Wireless Sensor Networks
    • September
    • Y. Zhou and Y. Fang, "A Two-Layer Key Establishment Scheme for Wireless Sensor Networks", IEEE Transactions on Mobile Computing, vol. 6, no. 9, pp. 1009-1020, September 2007.
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.9 , pp. 1009-1020
    • Zhou, Y.1    Fang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.