메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A key management scheme for heterogeneous wireless sensor networks based on group-oriented cryptography

Author keywords

Heterogeneous sensor networks; Key management scheme; Security

Indexed keywords

COMPUTATIONAL CAPABILITY; CONSTRAINED ENERGY; DEPLOYMENT KNOWLEDGE; DISTRIBUTED KEY MANAGEMENT; ENCRYPTION KEY; HETEROGENEOUS SENSOR NETWORKS; HETEROGENEOUS WIRELESS SENSOR NETWORKS; INNER GROUP; KEY ESTABLISHMENTS; KEY MANAGEMENT; PAIRWISE KEY; RANDOM KEY DISTRIBUTION; SECRET SHARING SCHEMES; SECURITY;

EID: 77958116785     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITAPP.2010.5566343     Document Type: Conference Paper
Times cited : (8)

References (14)
  • 1
    • 30344482882 scopus 로고    scopus 로고
    • INSENS: Intrusion-tolerant routing for wireless sensor networks
    • Jing Deng, Richard Han, Shivakant Mishra, "INSENS: Intrusion-tolerant routing for wireless sensor networks", Computer Communications,29(2), pp.216-230, 2006.
    • (2006) Computer Communications , vol.29 , Issue.2 , pp. 216-230
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 2
    • 62949194452 scopus 로고    scopus 로고
    • A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks
    • Xiaojiang Du, Mohsen Guizani, Yang Xiao,Usiao-Hwa Chen, "A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks", IEEE Transactions on wireless communications,VOL.8, NO.3, pp.1223-1229, 2009.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1223-1229
    • Du, X.1    Guizani, M.2    Xiao, Y.3    Chen, U.-H.4
  • 9
    • 33646921841 scopus 로고    scopus 로고
    • Loaction-aware combinatorial key management scheme for clustered sensor networks
    • Aug.
    • Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy, "Loaction-aware combinatorial key management scheme for clustered sensor networks," In IEEE Trans. On Parallel and Distributed System, vol. 17, NO.8, pp.865-882, Aug. 2006.
    • (2006) IEEE Trans. On Parallel and Distributed System , vol.17 , Issue.8 , pp. 865-882
    • Younis, M.F.1    Ghumman, K.2    Eltoweissy, M.3
  • 11
    • 33144476837 scopus 로고    scopus 로고
    • Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks
    • Zhang Yanchao, Liu Wei, Lou Wenjing, et al., "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks" ,IEEE Journal on Selected Areas in Commnuications, 24( 2) , 247-260, 2006.
    • (2006) IEEE Journal on Selected Areas in Commnuications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3
  • 13
    • 0018545449 scopus 로고
    • How to share a secret a secret
    • Nov.
    • A.Shamir, "How to share a secret a secret", Communications of the ACM, vol. 22, No.11, pp.612-613, Nov. 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 14
    • 34347240364 scopus 로고    scopus 로고
    • Key management schemes and protocols for wireless sensor networks
    • May
    • Su Zhong, Lin Chuang, Feng Fu-jun, Ren Feng-yuan, "Key management schemes and protocols for wireless sensor networks," Journal of Software, vol.18, No.5, pp.1218-1231, May 2007.
    • (2007) Journal of Software , vol.18 , Issue.5 , pp. 1218-1231
    • Su, Z.1    Lin, C.2    Feng, F.-J.3    Ren, F.-Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.