메뉴 건너뛰기




Volumn 5, Issue 3, 2010, Pages 556-569

Noninteractive pairwise key establishment for sensor networks

Author keywords

Key establishment; key management; noninteractive; sensor networks

Indexed keywords

DYNAMIC NODES; EXPERIMENTAL ASPECTS; KEY ESTABLISHMENTS; KEY MANAGEMENT; NETWORK CONFIGURATION; NODE COMPROMISE; NON-INTERACTIVE; PAIRWISE KEY; RANDOM PERTURBATIONS; RESOURCE LIMITATIONS; SECURITY MECHANISM; SECURITY PRIMITIVES;

EID: 77955667914     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2050140     Document Type: Article
Times cited : (39)

References (40)
  • 1
    • 44049101044 scopus 로고    scopus 로고
    • Sensor data cryptography in wireless sensor networks
    • Jun.
    • T. C. Aysal and K. E. Barner, "Sensor data cryptography in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol.3, no.2, pp. 273-289, Jun. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.2 , pp. 273-289
    • Aysal, T.C.1    Barner, K.E.2
  • 4
  • 6
    • 34247221952 scopus 로고    scopus 로고
    • Combinatorial design of key distribution mechanisms for wireless sensor networks
    • Apr.
    • S. A. Çamtepe and B. Yener, "Combinatorial design of key distribution mechanisms for wireless sensor networks," IEEE/ACM Trans. Netw., vol.15, no.2, pp. 346-358, Apr. 2007.
    • (2007) IEEE/ACM Trans. Netw. , vol.15 , Issue.2 , pp. 346-358
    • Çamtepe, S.A.1    Yener, B.2
  • 7
    • 42449162962 scopus 로고    scopus 로고
    • Expander graph based key distribution mechanisms in wireless sensor networks
    • Istanbul, Turkey
    • S. A. Çamtepe, B. Yener, and M. Yung, "Expander graph based key distribution mechanisms in wireless sensor networks," in Proc. IEEE Int. Conf. Communications (ICC), Istanbul, Turkey, 2006, pp. 2262-2267.
    • (2006) Proc. IEEE Int. Conf. Communications (ICC) , pp. 2262-2267
    • Çamtepe, S.A.1    Yener, B.2    Yung, M.3
  • 10
    • 33745969132 scopus 로고    scopus 로고
    • Defending against path-based dos attacks in wireless sensor networks
    • DOI 10.1145/1102219.1102235, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
    • J. Deng, R. Han, and S. Mishra, "Defending against path-based DoS attacks in wireless sensor networks," in Proc. Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Alexandria, VA, 2005, pp. 89-96. (Pubitemid 44059935)
    • (2005) SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks , vol.2005 , pp. 89-96
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 15
    • 64549108398 scopus 로고    scopus 로고
    • Security and privacy for distributed multimedia sensor networks
    • Jan.
    • D. Kundur, W. Luh, U. N. Okorafor, and T. Zourntos, "Security and privacy for distributed multimedia sensor networks," Proc. IEEE, vol.96, no.1, pp. 112-130, Jan. 2008.
    • (2008) Proc. IEEE , vol.96 , Issue.1 , pp. 112-130
    • Kundur, D.1    Luh, W.2    Okorafor, U.N.3    Zourntos, T.4
  • 18
    • 42149172778 scopus 로고    scopus 로고
    • Group-based key predistribution for wireless sensor networks
    • Mar.
    • D. Liu, P. Ning, and W. Du, "Group-based key predistribution for wireless sensor networks," ACM Trans. Sensor Netw., vol.4, no.2, pp. 11:1-11:30, Mar. 2008.
    • (2008) ACM Trans. Sensor Netw. , vol.4 , Issue.2 , pp. 111-1130
    • Liu, D.1    Ning, P.2    Du, W.3
  • 19
    • 40049091352 scopus 로고    scopus 로고
    • On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs
    • Mar.
    • J. Lee and D. R. Stinson, "On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs," ACM Trans. Inf. Syst. Security, vol.11, no.2, pp. 5:1-5:35, Mar. 2008.
    • (2008) ACM Trans. Inf. Syst. Security , vol.11 , Issue.2 , pp. 51-535
    • Lee, J.1    Stinson, D.R.2
  • 25
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • R. C. Merkle, "Secure communications over insecure channels," Commun. ACM, vol.21, no.4, pp. 294-299, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.C.1
  • 26
    • 36248933437 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • Barcelona, Catalunya, Spain
    • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," in Proc. 24th IEEE Conf. Computer Communications (INFOCOM), Barcelona, Catalunya, Spain, 2006, pp. 1-12.
    • (2006) Proc. 24th IEEE Conf. Computer Communications (INFOCOM) , pp. 1-12
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 27
    • 51249173817 scopus 로고
    • Randomized rounding: A technique for provably good algorithms and algorithmic proofs
    • P. Raghavan and C. D. Tompson, "Randomized rounding: A technique for provably good algorithms and algorithmic proofs," Combinatorica, vol.7, no.4, pp. 365-374, 1987.
    • (1987) Combinatorica , vol.7 , Issue.4 , pp. 365-374
    • Raghavan, P.1    Tompson, C.D.2
  • 29
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • 2nd Quarter
    • Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surveys Tutorials, vol.8, no.2, pp. 2-23, 2006, 2nd Quarter.
    • (2006) IEEE Commun. Surveys Tutorials , vol.8 , Issue.2 , pp. 2-23
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 30
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct.
    • A. D.Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol.35, no.10, pp. 54-62, Oct. 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.A.2
  • 32
    • 57349180418 scopus 로고    scopus 로고
    • A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks
    • Hong Kong, China (Poster Session)
    • C.-M. Yu, T.-Y. Chi, C.-S. Lu, and S.-Y. Kuo, "A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks," in Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Hong Kong, China, 2008, pp. 449-450, (Poster Session).
    • (2008) Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc) , pp. 449-450
    • Yu, C.-M.1    Chi, T.-Y.2    Lu, C.-S.3    Kuo, S.-Y.4
  • 33
    • 51649097218 scopus 로고    scopus 로고
    • A key management scheme using deployment knowledge for wireless sensor networks
    • Oct.
    • Z. Yu and Y. Guan, "A key management scheme using deployment knowledge for wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol.19, no.10, pp. 1411-1425, Oct. 2008.
    • (2008) IEEE Trans. Parallel Distrib. Syst. , vol.19 , Issue.10 , pp. 1411-1425
    • Yu, Z.1    Guan, Y.2
  • 34
    • 33646921841 scopus 로고    scopus 로고
    • Location-aware combinatorial key management scheme for clustered sensor networks
    • Aug.
    • M. F. Younis, K. Ghumman, and M. Eltoweissy, "Location-aware combinatorial key management scheme for clustered sensor networks," IEEE Trans. Parallel Distrib. Syst., vol.17, no.8, pp. 865-882, Aug. 2006.
    • (2006) IEEE Trans. Parallel Distrib. Syst. , vol.17 , Issue.8 , pp. 865-882
    • Younis, M.F.1    Ghumman, K.2    Eltoweissy, M.3
  • 36
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • Hong Kong, China
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," in Proc. 24th IEEE Conf. Computer Communications (INFOCOM), Hong Kong, China, 2004, pp. 2446-2457.
    • (2004) Proc. 24th IEEE Conf. Computer Communications (INFOCOM) , pp. 2446-2457
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 37
    • 18844411823 scopus 로고    scopus 로고
    • Understanding packet delivery performance in dense wireless sensor networks
    • Los Angeles, CA
    • J. Zhao and R. Govindan, "Understanding packet delivery performance in dense wireless sensor networks," in Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, 2003, pp. 1-13.
    • (2003) Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys) , pp. 1-13
    • Zhao, J.1    Govindan, R.2
  • 39
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proc. Annu. ACMComputer and Communications Security (CCS),Washington, DC, 2003, pp. 62-72. (Pubitemid 40673789)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.