메뉴 건너뛰기




Volumn 33, Issue 2, 2010, Pages 63-75

Wireless sensor network key management survey and taxonomy

Author keywords

Security; Sensor network

Indexed keywords

COMMUNICATION CAPABILITIES; ENCRYPTION KEY; KEY ESTABLISHMENTS; KEY MANAGEMENT; KEY PRE-DISTRIBUTION; SECURE COMMUNICATIONS; SECURITY MECHANISM; SECURITY SENSORS;

EID: 75149127612     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2009.10.001     Document Type: Review
Times cited : (251)

References (55)
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advance in cryptology-crypto
    • Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Advance in cryptology-crypto, Lecture notes in computer science, vol. 2139, 2001. p. 213-29.
    • (2001) Lecture notes in computer science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 4
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption, a Swiss army knife for identity-based cryptography
    • Proceedings of the 23rd international conference on advances in cryptology
    • Boyen X. Multipurpose identity-based signcryption, a Swiss army knife for identity-based cryptography. In: Proceedings of the 23rd international conference on advances in cryptology, Lecture notes in computer science, vol. 2729, 2003. p. 383-399.
    • (2003) Lecture notes in computer science , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 5
    • 52049119700 scopus 로고    scopus 로고
    • Securing wireless sensor networks: security architectures
    • Boyle D., and Newe T. Securing wireless sensor networks: security architectures. Journal of Networks 3 1 (2008) 65-77
    • (2008) Journal of Networks , vol.3 , Issue.1 , pp. 65-77
    • Boyle, D.1    Newe, T.2
  • 6
    • 34247221952 scopus 로고    scopus 로고
    • Combinatorial design of key distribution mechanisms for wireless sensor networks
    • Camtepe S.A., and Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking (TON) 15 2 (2007) 346-358
    • (2007) IEEE/ACM Transactions on Networking (TON) , vol.15 , Issue.2 , pp. 346-358
    • Camtepe, S.A.1    Yener, B.2
  • 7
    • 34247224664 scopus 로고    scopus 로고
    • Key distribution mechanisms for wireless sensor networks: A survey
    • Technical report TR-05-07;
    • Camtepte SA, Yener B. Key distribution mechanisms for wireless sensor networks: a survey. Technical report TR-05-07; 2005.
    • (2005)
    • Camtepte, S.A.1    Yener, B.2
  • 10
    • 10444246846 scopus 로고    scopus 로고
    • Identity-based authenticated key agreement protocols from pairings
    • Technical report; 2002, ePrint Archive, Report 2002/184
    • Chen L, Kudla C. Identity-based authenticated key agreement protocols from pairings. Technical report; 2002, ePrint Archive, Report 2002/184 〈http://eprint.iacr.org/2002/184〉.
    • Chen, L.1    Kudla, C.2
  • 13
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • IEEE Press, Hong Kong
    • Du W., Han Y.S., Chen S., and Varshney P.K. A key management scheme for wireless sensor networks using deployment knowledge. Proceedings of IEEE INFOCOM04 (2004), IEEE Press, Hong Kong 586-597
    • (2004) Proceedings of IEEE INFOCOM04 , pp. 586-597
    • Du, W.1    Han, Y.S.2    Chen, S.3    Varshney, P.K.4
  • 15
    • 29844457287 scopus 로고    scopus 로고
    • An efficient scheme for authenticating public keys in sensor networks
    • May
    • Du W, Wang R, Ning P. An efficient scheme for authenticating public keys in sensor networks. In: Proceeding of the MobiHoc, May 2005b. p. 58-67.
    • (2005) Proceeding of the MobiHoc , pp. 58-67
    • Du, W.1    Wang, R.2    Ning, P.3
  • 17
  • 24
    • 25844530844 scopus 로고    scopus 로고
    • New constructions on broadcast encryption and key pre-distribution schemes
    • IEEE Press, Miami
    • Huang C., and Du D. New constructions on broadcast encryption and key pre-distribution schemes. Proceedings of IEEE INFOCOM05 (2005), IEEE Press, Miami 515-523
    • (2005) Proceedings of IEEE INFOCOM05 , pp. 515-523
    • Huang, C.1    Du, D.2
  • 27
    • 0034539015 scopus 로고    scopus 로고
    • Directed diffusion: A scalable and robust communication paradigm for sensor networks
    • Intanagonwiwat C, Govindan R, Estrin D. Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: Mobile computing and networking, 2000. p. 56-67.
    • (2000) Mobile computing and networking , pp. 56-67
    • Intanagonwiwat, C.1    Govindan, R.2    Estrin, D.3
  • 32
    • 24144503356 scopus 로고    scopus 로고
    • Deterministic key predistribution schemes for distributed sensor networks
    • Proceedings of ACM symposium on applied computing, Waterloo, Canada, 2005
    • Lee J, Stinson DR. Deterministic key predistribution schemes for distributed sensor networks. In: Proceedings of ACM symposium on applied computing 2004, Lecture notes in computer science, vol. 3357, 2005, Waterloo, Canada, 2004. p. 294-307.
    • (2004) Lecture notes in computer science , vol.3357 , pp. 294-307
    • Lee, J.1    Stinson, D.R.2
  • 35
    • 84866860550 scopus 로고    scopus 로고
    • Improving key pre-distribution with deployment knowledge in static sensor networks
    • Liu D., and Ning P. Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 1 2 (2005) 204-239
    • (2005) ACM Transactions on Sensor Networks , vol.1 , Issue.2 , pp. 204-239
    • Liu, D.1    Ning, P.2
  • 39
    • 84941637905 scopus 로고    scopus 로고
    • Signing on a Postcard
    • Proceedings of financial cryptography
    • Naccache D, Stern J. Signing on a Postcard. In: Proceedings of financial cryptography, Lecture notes in computer science, vol. 1962, 2000, pp. 121-35.
    • (2000) Lecture notes in computer science , vol.1962 , pp. 121-135
    • Naccache, D.1    Stern, J.2
  • 45
    • 85020598353 scopus 로고
    • Identity-based crytosystems and signature schemes
    • Advances in Cryptology-Crypto84, Berlin: Springer;
    • Shamir A. Identity-based crytosystems and signature schemes. In: Advances in Cryptology-Crypto84, Lecture notes in computer science, vol. 196. Berlin: Springer; 1984. p. 47.
    • (1984) Lecture notes in computer science , vol.196 , pp. 47
    • Shamir, A.1
  • 46
    • 14844287958 scopus 로고    scopus 로고
    • The strange logic of random graphs
    • Springer, Berlin
    • Spencer J. The strange logic of random graphs. Algorithms and combinatorics vol. 22 (2000), Springer, Berlin
    • (2000) Algorithms and combinatorics , vol.22
    • Spencer, J.1
  • 47
    • 33846090258 scopus 로고    scopus 로고
    • Review of key management mechanisms in wireless sensor networks
    • Sun D.-M., and He B. Review of key management mechanisms in wireless sensor networks. Acta Automatica Sinica 32 6 (2006) 900-906
    • (2006) Acta Automatica Sinica , vol.32 , Issue.6 , pp. 900-906
    • Sun, D.-M.1    He, B.2
  • 49
    • 33749659889 scopus 로고    scopus 로고
    • Energy analysis of public-key cryptography on small wireless devices
    • March
    • Wander A, Gura N, Eberle H, Gupta V, Shantz S. Energy analysis of public-key cryptography on small wireless devices. IEEE PerCom, March 2005.
    • (2005) IEEE PerCom
    • Wander, A.1    Gura, N.2    Eberle, H.3    Gupta, V.4    Shantz, S.5
  • 53


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.