메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A lightweight user authentication scheme for wireless sensor networks

Author keywords

Mutual authentication; Session key agreement; User authentication; Wireless sensor networks; WSNs

Indexed keywords

MOBILE DEVICES; MOBILE SECURITY; NETWORK SECURITY; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 78049456501     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AICCSA.2010.5586995     Document Type: Conference Paper
Times cited : (40)

References (19)
  • 1
    • 67650461985 scopus 로고    scopus 로고
    • Privacy preservation in wireless sensor networks: A state-of-the-art survey
    • N. Li, N. Zhang, S. K. Das, and B. Thuraisingham, "Privacy preservation in wireless sensor networks: A state-of-the-art survey," Ad Hoc Networks, vol. 7, no. 8, pp. 1501-1514, 2009.
    • (2009) Ad Hoc Networks , vol.7 , Issue.8 , pp. 1501-1514
    • Li, N.1    Zhang, N.2    Das, S.K.3    Thuraisingham, B.4
  • 6
    • 85028765277 scopus 로고
    • Perfectly-secure key distribution for dynamic conferences
    • Advances in Cryptology CRYPTO 92, ser.
    • C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in in Advances in Cryptology CRYPTO 92, ser. LNCS 740, 1993, pp. 471-486.
    • (1993) LNCS , vol.740 , pp. 471-486
    • Blundo, C.1    Santis, A.D.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 10
    • 34249276408 scopus 로고    scopus 로고
    • Threshold password authentication against guessing attacks in ad hoc networks
    • Z. Chai and a. R. L. Zhenfu Cao, "Threshold password authentication against guessing attacks in ad hoc networks," Ad Hoc Networks, vol. 5, 2007.
    • (2007) Ad Hoc Networks , vol.5
    • Chai, Z.1    Zhenfu Cao, A.R.L.2
  • 11
    • 84965066515 scopus 로고    scopus 로고
    • National institute of standards and technology (nist), advanced encryption standard (aes)
    • "National institute of standards and technology (nist), advanced encryption standard (aes)." Federal Information Processing Standards Publications (FIPS PUBS) 197, 2001.
    • (2001) Federal Information Processing Standards Publications (FIPS PUBS) , pp. 197
  • 13
    • 48249151851 scopus 로고    scopus 로고
    • Accelerated aes implementations via generalized instruction set extensions
    • A. J. Elbirt, "Accelerated aes implementations via generalized instruction set extensions," J. Com put. Secur., vol. 16, no. 3, pp. 265-288, 2008.
    • (2008) J. Com Put. Secur. , vol.16 , Issue.3 , pp. 265-288
    • Elbirt, A.J.1
  • 15
    • 33744729631 scopus 로고    scopus 로고
    • Recent developments in cryptographic hash functions: Security implications and future directions
    • [Online]. Available
    • C. Cid, "Recent developments in cryptographic hash functions: Security implications and future directions," Information Security Technical Report, vol. 11, no. 2, pp. 100-107, 2006. [Online]. Available: http://www.sciencedirect.com/science/article/B6VJC- 4K4H47T-7/2/ 501a7fb3b6cf98383eddb6b3dc1ecf05
    • (2006) Information Security Technical Report , vol.11 , Issue.2 , pp. 100-107
    • Cid, C.1
  • 17
    • 47749137893 scopus 로고    scopus 로고
    • Telos Mote: www.ece.osu.edu/bibyk/ee582/telosMote.pdf.
    • Telos Mote
  • 19
    • 78049480409 scopus 로고    scopus 로고
    • TinyOS: http://www.tinyos.net/, 2009.
    • (2009) TinyOS


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.