메뉴 건너뛰기




Volumn 16, Issue 4, 2010, Pages 999-1009

Achieving robust message authentication in sensor networks: A public-key based approach

Author keywords

Authentication; Denial of service; ECC; Sensor networks

Indexed keywords

BATTERY POWER; DATA PACKET; DEFENSE MECHANISM; DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; ECC; ELLIPTIC CURVE CRYPTOGRAPHY; FALSE DATA; FALSE DATA FILTERING; HARDWARE RESOURCES; MESSAGE AUTHENTICATION; MICAZ MOTES; PACKET FILTERING; PUBLIC KEYS; REAL-WORLD IMPLEMENTATION; RECENT PROGRESS; RESOURCE-CONSTRAINED; SECURITY THREATS; SENSOR DEPLOYMENT; SYMMETRIC KEYS; THRESHOLD CRYPTOGRAPHY;

EID: 77954085269     PISSN: 10220038     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11276-009-0184-z     Document Type: Article
Times cited : (10)

References (39)
  • 2
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • Ye, F., Luo, H., Lu, S., & Zhang, L. (2004). Statistical en-route filtering of injected false data in sensor networks. INFOCOM.
    • (2004) INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 4
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • May Oakland, CA
    • Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004, May). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of the IEEE symposium on security and privacy, Oakland, CA.
    • (2004) Proceedings of the IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 5
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • DOI 10.1109/JSAC.2005.861382
    • Y. Zhang W. Liu W. Lou Y. Fang 2006 Location-based compromise-tolerant security mechanisms for wireless sensor networks IEEE Journal on Selected Areas in Communications (Special Issue on Security in Wireless Ad Hoc Networks) 24 2 247 260 (Pubitemid 43269747)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 8
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • May Berkeley, California
    • Chan, H., Perrig, A., & Song, D. (2003, May). Random key predistribution schemes for sensor networks. In IEEE symposium on Security and Privacy (pp. 197-213). Berkeley, California.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 9
    • 24944474308 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks
    • Du, W., & Deng, J. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. ACM CCS.
    • (2003) ACM CCS
    • Du, W.1    Deng, J.2
  • 11
    • 33645692509 scopus 로고    scopus 로고
    • Improving key pre-distribution with deployment knowledge in static sensor networks
    • D. Liu P. Ning 2005 Improving key pre-distribution with deployment knowledge in static sensor networks ACM Transaction on Sensor Networks 20 1 32
    • (2005) ACM Transaction on Sensor Networks , vol.20 , pp. 1-32
    • Liu, D.1    Ning, P.2
  • 17
  • 18
    • 0041472588 scopus 로고    scopus 로고
    • An energy-efficient hierarchical clustering algorithm for wireless sensor networks
    • Bandyopadhyay, S., & Coyle, E. (2003). An energy-efficient hierarchical clustering algorithm for wireless sensor networks. INFOCOM.
    • (2003) INFOCOM
    • Bandyopadhyay, S.1    Coyle, E.2
  • 19
    • 0035009259 scopus 로고    scopus 로고
    • A clustering scheme for hierarchical control in multi-hop wireless networks
    • Bannerjee, S., & Khuller, S. (2001). A clustering scheme for hierarchical control in multi-hop wireless networks. INFOCOM.
    • (2001) INFOCOM
    • Bannerjee, S.1    Khuller, S.2
  • 20
    • 77954082905 scopus 로고    scopus 로고
    • Distributed clustering algorithm for ad-hoc networks
    • Basagni, S. (1999). Distributed clustering algorithm for ad-hoc networks. I-SPAN.
    • (1999) I-SPAN
    • Basagni, S.1
  • 21
    • 0012797660 scopus 로고    scopus 로고
    • CA: A weighted clustering algorithm for mobile ad hoc networks
    • Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing.
    • (2002) Cluster Computing
    • Chatterjee, M.1    Das, S.K.2    Turgut, D.3
  • 22
    • 33646589837 scopus 로고    scopus 로고
    • An application-specific protocol architecture for wireless microsensor networks
    • DOI 10.1109/TWC.2002.804190
    • W. R. Heinzelman A. Chandrakasan H. Baladrishnan 2002 An application-specific protocol architecture for wireless microsensor networks IEEE Transaction on Wireless Communication 1 4 660 670 10.1109/TWC.2002.804190 (Pubitemid 44934253)
    • (2002) IEEE Transactions on Wireless Communications , vol.1 , Issue.4 , pp. 660-670
    • Heinzelman, W.B.1    Chandrakasan, A.P.2    Balakrishnan, H.3
  • 23
    • 4544285741 scopus 로고    scopus 로고
    • Distributed clustering in ad-hoc sensor networks
    • Younis, O. & Fahmy, S. (2004). Distributed clustering in ad-hoc sensor networks. INFOCOM.
    • (2004) INFOCOM
    • Younis, O.1    Fahmy, S.2
  • 24
    • 0034539015 scopus 로고    scopus 로고
    • Directed diffusion: A scalable and robust communication paradigm for sensor networks
    • Intanagonwiwat, C., Govindan, R., & Estrin, D. (2000). Directed diffusion: A scalable and robust communication paradigm for sensor networks. MOBICOM.
    • (2000) MOBICOM
    • Intanagonwiwat, C.1    Govindan, R.2    Estrin, D.3
  • 25
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless neworks
    • Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless neworks. MOBICOM.
    • (2000) MOBICOM
    • Karp, B.1    Kung, H.T.2
  • 27
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis and defenses
    • Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: Analysis and defenses. IPSN.
    • (2004) IPSN
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 29
    • 0018545449 scopus 로고
    • How to share a secret
    • DOI 10.1145/359168.359176
    • A. Shamir 1979 How to share a secret. Commun. ACM (1979) 22 11 612 613 0414.94021 10.1145/359168.359176 549252 (Pubitemid 10431338)
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 30
    • 51849154205 scopus 로고    scopus 로고
    • Comparing symmetric-key and public-key based schemes in sensor networks: A case study for user access control
    • (2008, June) Beijing, China
    • Wang, H., Sheng, B., Tan, C. C., & Li, Q. (2008, June). Comparing symmetric-key and public-key based schemes in sensor networks: A case study for user access control. In Proceedings of ICDCS, Beijing, China.
    • Proceedings of ICDCS
    • Wang, H.1    Sheng, B.2    Tan, C.C.3    Li, Q.4
  • 32
    • 41549167232 scopus 로고    scopus 로고
    • A framework for identifying compromised nodes in wireless sensor networks
    • DOI 10.1145/1341731.1341733
    • Q. Zhang T. Yu P. Ning 2008 A framework for identifying compromised nodes in wireless sensor networks ACM Trans. Inf. Syst. Secur 11 3 1 37 05669865 10.1145/1341731.1341733 (Pubitemid 351462726)
    • (2008) ACM Transactions on Information and System Security , vol.11 , Issue.3 , pp. 12
    • Zhang, Q.1    Yu, T.2    Ning, P.3
  • 34
    • 13244263673 scopus 로고    scopus 로고
    • Crossbow Technology INC
    • Crossbow Technology INC. Wireless sensor networks. http://www.xbow.com/ Products/Wireless-Sensor-Networks.htm.
    • Wireless Sensor Networks
  • 35
    • 46849114424 scopus 로고    scopus 로고
    • Tiny OS. (2006). Tinyos 1.1.10. http://www.tinyos.net.
    • (2006) Tinyos 1.1.10


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.