메뉴 건너뛰기




Volumn 34, Issue 1, 2011, Pages 80-88

A mutual-healing key distribution scheme in wireless sensor networks

Author keywords

Key distribution; Security; Self healing; Sensor network

Indexed keywords

BILINEAR PAIRING; BROADCAST MESSAGES; FIXED NUMBERS; FORMAL DEFINITION; KEY DISTRIBUTION; KEY DISTRIBUTION SCHEMES; PRIVATE KEY; SECURE SESSION; SECURITY; SELF-HEALING; SESSION KEY; STORAGE OVERHEAD; TRADITIONAL COMPUTERS; WIRELESS SENSOR;

EID: 78649318959     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2010.09.002     Document Type: Article
Times cited : (35)

References (39)
  • 1
    • 0004135561 scopus 로고    scopus 로고
    • Key management for large dynamic groups: One-way function trees and amortized initialization
    • March 15
    • Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: one-way function trees and amortized initialization, IRTF SMUG Meeting, March 15, 1999.
    • (1999) IRTF SMUG Meeting
    • Balenson, D.1    McGrew, D.2    Sherman, A.3
  • 5
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • Miami, Florida; March
    • Capkun S, Hubaux J-P. Secure positioning of wireless devices with application to sensor networks. In: Proceedings of IEEE INFOCOM. Miami, Florida; March 2005. p. 191728.
    • (2005) Proceedings of IEEE INFOCOM , pp. 1917-1928
    • Capkun, S.1    Hubaux, J.-P.2
  • 6
    • 20444502239 scopus 로고    scopus 로고
    • An ID-based broadcast encryption scheme for key distribution
    • X. Du, Y. Wang, J. Ge, and Y. Wang An ID-based broadcast encryption scheme for key distribution IEEE Transactions on Broadcasting 51 2 2005 264 266
    • (2005) IEEE Transactions on Broadcasting , vol.51 , Issue.2 , pp. 264-266
    • Du, X.1    Wang, Y.2    Ge, J.3    Wang, Y.4
  • 8
    • 38049016463 scopus 로고    scopus 로고
    • Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains
    • Lecture notes in computer science
    • Dutta R, Chang EC, Mukhopadhyay S. Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains. In: ACNS 2007, Lecture notes in computer science, vol. 4521; 2007. p. 385400.
    • (2007) ACNS 2007 , vol.4521 , pp. 385-400
    • Dutta, R.1    Chang, E.C.2    Mukhopadhyay, S.3
  • 13
    • 84937435227 scopus 로고    scopus 로고
    • The LSD broadcast encryption scheme
    • Lecture notes in computer science
    • Halevy D, Shamir A. The LSD broadcast encryption scheme. In: Advances in cryptologycrypto' 02. Lecture notes in computer science, vol. 2442; 2002. p. 4760.
    • (2002) Advances in Cryptology-crypto' 02 , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 14
    • 33847305360 scopus 로고    scopus 로고
    • Fingerprint images encryption via multi-scroll chaotic attractors
    • F. Han, J. Hu, X. Yu, and Y. Wang Fingerprint images encryption via multi-scroll chaotic attractors Applied Mathematics and Computation 185 2 2007 931 939
    • (2007) Applied Mathematics and Computation , vol.185 , Issue.2 , pp. 931-939
    • Han, F.1    Hu, J.2    Yu, X.3    Wang, Y.4
  • 15
    • 65949120002 scopus 로고    scopus 로고
    • Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
    • S. Han, B. Tian, M. He, and E. Chang Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks IEEE Transactions on Wireless Communications 8 4 2009
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.4
    • Han, S.1    Tian, B.2    He, M.3    Chang, E.4
  • 17
    • 27644512043 scopus 로고    scopus 로고
    • An efficient key distribution scheme with self-healing property
    • D. Hong, and J.S. Kang An efficient key distribution scheme with self-healing property IEEE Communication Letters 9 8 2005
    • (2005) IEEE Communication Letters , vol.9 , Issue.8
    • Hong, D.1    Kang, J.S.2
  • 18
    • 77955333989 scopus 로고    scopus 로고
    • A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
    • J. Hu, H.H. Chen, and TW. Hou A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations Computer Standards & Interfaces 32 56 2010 274 280
    • (2010) Computer Standards & Interfaces , vol.32 , Issue.56 , pp. 274-280
    • Hu, J.1    Chen, H.H.2    Hou, T.W.3
  • 19
    • 67349221790 scopus 로고    scopus 로고
    • A pixel-based scrambling scheme for digital medical images protection
    • J. Hu, and F. Han A pixel-based scrambling scheme for digital medical images protection Journal of Network and Computer Applications 32 4 2009 788 794
    • (2009) Journal of Network and Computer Applications , vol.32 , Issue.4 , pp. 788-794
    • Hu, J.1    Han, F.2
  • 20
    • 33750008721 scopus 로고    scopus 로고
    • Self-healing group key distribution with time-limited node revocation for wireless sensor networks
    • Jiang Y, Lin C, Shi M, Shen X. Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad hoc Networks 2007;5:1423.
    • (2007) Ad Hoc Networks , vol.5 , pp. 14-23
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4
  • 22
    • 84943248325 scopus 로고    scopus 로고
    • An improved key management scheme for large dynamic groups using one-way function trees
    • October
    • Ku W, Chen S. An improved key management scheme for large dynamic groups using one-way function trees. In: International conference on parallel processing workshops '03. October 2003. p. 3916.
    • (2003) International Conference on Parallel Processing Workshops '03 , pp. 391-396
    • Ku, W.1    Chen, S.2
  • 28
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Lecture notes in computer science
    • Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Advances in cryptologycrypto '01. Lecture notes in computer science, vol. 2139; 2001. p. 4162.
    • (2001) Advances in Cryptology-crypto '01 , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 29
    • 0038650586 scopus 로고    scopus 로고
    • Efficient trace and revoke schemes
    • Lecture notes in computer science
    • Naor M, Pinkas B. Efficient trace and revoke schemes. In: Financial cryptography' 2000. Lecture notes in computer science, vol. 1962; 2000. p. 121.
    • (2000) Financial Cryptography' 2000 , vol.1962 , pp. 1-21
    • Naor, M.1    Pinkas, B.2
  • 32
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature scheme
    • A. Shamir Identity-based cryptosystems and signature scheme Proceedings of Crypto 84 1984 47 53
    • (1984) Proceedings of Crypto , vol.84 , pp. 47-53
    • Shamir, A.1
  • 34
    • 78649325327 scopus 로고    scopus 로고
    • A chaos based encryption technique to protect ECG packets for time critical telecardiology applications
    • doi:10.1002/sec.226
    • Sufi F, Han F, Khail I, Hu J. A chaos based encryption technique to protect ECG packets for time critical telecardiology applications. Journal of Security and Communication Networks (2010), doi:10.1002/sec.226.
    • (2010) Journal of Security and Communication Networks
    • Sufi, F.1    Han, F.2    Khail, I.3    Hu, J.4
  • 36
    • 78649321231 scopus 로고    scopus 로고
    • A Fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
    • doi:10.1002/sec.225
    • Xi K, Ahmad T, Han F, Hu J. A Fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Journal of Security and Communication Networks (2010), doi:10.1002/sec.225.
    • (2010) Journal of Security and Communication Networks
    • Xi, K.1    Ahmad, T.2    Han, F.3    Hu, J.4
  • 38
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang Location-based compromise-tolerant security mechanisms for wireless sensor networks IEEE Journal on Selected Areas in Communications 24 2 2006 247 260
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.