메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1-6

A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography

Author keywords

DHECC; Key agreement; Rekeying; RSA; Wireless sensor networks

Indexed keywords

DHECC; KEY AGREEMENT; RE-KEYING; RSA; WIRELESS SENSOR;

EID: 77957605947     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICASID.2010.5551480     Document Type: Conference Paper
Times cited : (32)

References (25)
  • 3
    • 35048818581 scopus 로고    scopus 로고
    • Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
    • Cryptographic Hardware and Embedded Systems - CHES 2004
    • N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz. "Comparing elliptic curve cryptography and rsa on 8-bit cpus," In: 2004 workshop on cryptographic hardware and embedded systems, pp. 119-132, August 2004. (Pubitemid 39112461)
    • (2004) LECTURE NOTES IN COMPUTER SCIENCE , Issue.3156 , pp. 119-132
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 8
    • 33750023217 scopus 로고    scopus 로고
    • An effective key management scheme for heterogeneous sensor networks
    • DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
    • Y. Xiao, V. Rayi, B. Sun, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, 2007. (Pubitemid 44573000)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 24-34
    • Du, X.1    Xiao, Y.2    Guizani, M.3    Chen, H.-H.4
  • 10
    • 63149098881 scopus 로고    scopus 로고
    • A Key management scheme for cluster based wireless sensor networks
    • R. Azarderakhsh, A. Reyhani-Masoleh, and Z. Abid, "A Key management scheme for cluster based wireless sensor networks," EUC (2), pp.222-227, 2008.
    • (2008) EUC , Issue.2 , pp. 222-227
    • Azarderakhsh, R.1    Reyhani-Masoleh, A.2    Abid, Z.3
  • 11
    • 70350464378 scopus 로고    scopus 로고
    • Using trust for key distribution and route selection in wireless sensor networks
    • Nov.
    • N. Lewis, N. Foukia, "Using trust for key distribution and route selection in wireless sensor networks," IEEE Globecom, pp.16-30, Nov. 2007.
    • (2007) IEEE Globecom , pp. 16-30
    • Lewis, N.1    Foukia, N.2
  • 13
    • 0017930809 scopus 로고
    • METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
    • DOI 10.1145/359340.359342
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol.21, no.2, pp.120-126, February 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 15
    • 14844287829 scopus 로고    scopus 로고
    • TR-04-04, Computer Science Group, Harvard University
    • D. Malan, "Crypto for tiny objects," TR-04-04, Computer Science Group, Harvard University, 2004.
    • (2004) Crypto for Tiny Objects
    • Malan, D.1
  • 16
    • 0141473270 scopus 로고    scopus 로고
    • Fast variants of RSA in RSA Laboratories
    • Winter-Spring
    • D. Boneh and H. Shacham, "Fast variants of RSA," in RSA Laboratories' Crypto-bytes, vol 5 no.1, pp. 1-8, Winter-Spring 2002.
    • (2002) Crypto-bytes , vol.5 , Issue.1 , pp. 1-8
    • Boneh, D.1    Shacham, H.2
  • 17
    • 56749181478 scopus 로고    scopus 로고
    • Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks mobile wireless sensor network
    • M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, "Emergent properties: detection of the node-capture attack in mobile wireless sensor networks," In mobile wireless sensor network. In WiSec 2008.
    • (2008) WiSec
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3    Mei, A.4
  • 21
    • 35048818581 scopus 로고    scopus 로고
    • Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
    • Cryptographic Hardware and Embedded Systems - CHES 2004
    • N. Gura, A. Patel, and A. Wander, "Comparing Elliptic. Curve Cryptography and RSA on 8bit CPUs[C]," In Proceedings of the Workshop on Cryptography Hardware and Embedded systems (CHES 2004), 2004. (Pubitemid 39112461)
    • (2004) LECTURE NOTES IN COMPUTER SCIENCE , Issue.3156 , pp. 119-132
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 22
    • 72349088203 scopus 로고    scopus 로고
    • [Online] Available.[Accessed: March 29 2010]
    • T. Bokareva, "Mini Hardware Survey," [Online]. Available: http://www.cse.unsw.edu.au/~sensar/hardware/hardwaresurvey.html.[Accessed: March 29, 2010].
    • Mini Hardware Survey
    • Bokareva, T.1
  • 23
    • 33750023217 scopus 로고    scopus 로고
    • An effective key management scheme for heterogeneous sensor networks
    • DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
    • X. Du, S. Ci, X. Yang, M. Guizani, H. Chen, "A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks," IEEE ICC 2007. (Pubitemid 44573000)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 24-34
    • Du, X.1    Xiao, Y.2    Guizani, M.3    Chen, H.-H.4
  • 24
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks
    • March
    • Muhammad Khurram Khan, Khaled Alghathbar, "Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks,'" Sensors, Vol.10, Issue 3, pp.2450-2459, March 2010.
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 25
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • DOI 10.1016/j.csi.2006.11.005, PII S0920548906001322
    • Muhammad Khurram Khan, Jiashu Zhang, "Improving the Security of 'A Flexible Biometrics Remote User Authentication Scheme,'" Computer Standards and Interfaces (CSI), Elsevier Science, UK, vol.29, issue 1, pp. 84-87, January 2007. (Pubitemid 46771122)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.-M.1    Zhang, W.-F.2    Zhang, J.-S.3    Khan, M.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.