메뉴 건너뛰기




Volumn 28, Issue 7, 2010, Pages 1036-1045

A randomized countermeasure against parasitic adversaries in wireless sensor networks

Author keywords

Confidentiality; GossiCrypt; Probabilistic Key Refreshing and En route Encryption; Security

Indexed keywords

COMMUNICATION COST; CONFIDENTIALITY; DATA CONFIDENTIALITY; EN-ROUTE; ENERGY CONSUMPTION; GOSSICRYPT; LOW-COMPLEXITY; ORDERS OF MAGNITUDE; PHYSICAL ATTACKS; PUBLIC KEYS; RE-ENCRYPTION; SECURITY; SOURCE NODES; SYMMETRIC KEY ENCRYPTION; WIRELESS SENSOR NODE;

EID: 77956217417     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2010.100908     Document Type: Article
Times cited : (10)

References (21)
  • 1
    • 77956210259 scopus 로고    scopus 로고
    • ISO, Information Technology -Security Techniques -Key Management -Part 2: Mechanisms Using Symmetric Techniques
    • ISO, Information Technology -Security Techniques -Key Management -Part 2: Mechanisms Using Symmetric Techniques. In ISO/IEC 11770-2, International Standard, 1996.
    • (1996) ISO/IEC 11770-2, International Standard
  • 2
    • 77956216922 scopus 로고    scopus 로고
    • ISO, Information Technology -Security Techniques -Key Management -Part 3: Mechanisms Using Asymmetric Techniques
    • ISO, Information Technology -Security Techniques -Key Management -Part 3: Mechanisms Using Asymmetric Techniques. In ISO/IEC 11770-3, International Standard, 1999.
    • (1999) ISO/IEC 11770-3, International Standard
  • 3
    • 33750842647 scopus 로고    scopus 로고
    • ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations
    • G. Bertoni, L. Breveglieri, and M. Venturi. ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations. In Proc. 3rd IEEE ITNG, 2006.
    • (2006) Proc. 3rd IEEE ITNG
    • Bertoni, G.1    Breveglieri, L.2    Venturi, M.3
  • 4
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 6
    • 77956192822 scopus 로고    scopus 로고
    • Crypto++ library benchmarks, http://gd.tuwien.ac.at/privacy/crypto/ libs/cryptlib/benchmarks.html.
    • Crypto++ Library Benchmarks
  • 7
    • 31844450265 scopus 로고    scopus 로고
    • Public key cryptography in sensor networks -Revisited
    • G. Gaubatz, J.-P. Kaps, and B. Sunar. Public key cryptography in sensor networks -Revisited. In Proc. 1st ESAS, 2004.
    • (2004) Proc. 1st ESAS
    • Gaubatz, G.1    Kaps, J.-P.2    Sunar, B.3
  • 9
    • 33745639957 scopus 로고    scopus 로고
    • Node compromise in sensor networks: The need for secure systems
    • University of Colorado at Boulder
    • C. Hartung, J. Balasalle, and R. Han. Node Compromise in Sensor Networks: The Need for Secure Systems. Technical Report CU-CS-990-05, University of Colorado at Boulder, 2005.
    • (2005) Technical Report CU-CS-990-05
    • Hartung, C.1    Balasalle, J.2    Han, R.3
  • 10
    • 77956220089 scopus 로고    scopus 로고
    • http://www.tinyos.net/.
  • 11
    • 26444574670 scopus 로고    scopus 로고
    • Tinysec: A link layer security architecture for wireless sensor networks
    • C. Karlof, N. Sastry, and D. Wagner. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proc. 2nd ACM SenSys, 2004.
    • (2004) Proc. 2nd ACM SenSys
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 12
    • 3042782268 scopus 로고    scopus 로고
    • TOSSIM: Accurate and scalable simulation of entire tinyos applications
    • P. Levis, N. Lee, M. Welsh, and D. Culler. TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications. In Proc. 1st ACM SenSys, 2003.
    • (2003) Proc. 1st ACM SenSys
    • Levis, P.1    Lee, N.2    Welsh, M.3    Culler, D.4
  • 13
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • A. Liu and P. Ning. TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In Proc. 7th IPSN, 2008.
    • (2008) Proc. 7th IPSN
    • Liu, A.1    Ning, P.2
  • 14
    • 51749114903 scopus 로고    scopus 로고
    • Gossicrypt: Wireless sensor network data confidentiality against parasitic adversaries
    • J. Luo, P. Papadimitratos, and J.-P. Hubaux. GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries. In Proc. 5th IEEE SECON, 2008.
    • (2008) Proc. 5th IEEE SECON
    • Luo, J.1    Papadimitratos, P.2    Hubaux, J.-P.3
  • 19
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • A. Perrig, J. Stankovic, and D. Wagner. Security in Wireless Sensor Networks. Commun. ACM, 47(6):53-57, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 20
    • 34547420699 scopus 로고    scopus 로고
    • How public key cryptography influences wireless sensor node lifetime
    • K. Piotrowski, P. Langendoerfer, and S. Peter. How Public Key Cryptography Influences Wireless Sensor Node Lifetime. In Proc. 4th ACM SASN, 2006.
    • (2006) Proc. 4th ACM SASN
    • Piotrowski, K.1    Langendoerfer, P.2    Peter, S.3
  • 21
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. Wood and J. Stankovic. Denial of Service in Sensor Networks. IEEE Computer, 35(10):54-62, 2003.
    • (2003) IEEEComputer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.