메뉴 건너뛰기




Volumn 23, Issue 1, 2011, Pages 176-184

Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks

Author keywords

Distributed systems; sensor networks

Indexed keywords

ANALYTICAL RESULTS; COMMUNICATION OVERHEADS; COMPOSITE SCHEMES; CRYPTOGRAPHIC TECHNIQUES; DISTRIBUTED SYSTEMS; HIGH PROBABILITY; KEY PREDISTRIBUTION SCHEME; MOBILE SINKS; NETWORK RESILIENCE; ON THE FLIES; PAIRWISE KEY; PRE-DISTRIBUTION SCHEME; SECURE DATA; SECURITY ANALYSIS; SECURITY SERVICES;

EID: 78649870226     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2010.57     Document Type: Article
Times cited : (56)

References (31)
  • 1
    • 0345851235 scopus 로고    scopus 로고
    • Wireless integrated network sensors
    • G.J. Pottie and W.J. Kaiser, "Wireless Integrated Network Sensors," Comm. ACM, vol. 43, pp. 51-58, 2000.
    • (2000) Comm. ACM , vol.43 , pp. 51-58
    • Pottie, G.J.1    Kaiser, W.J.2
  • 5
    • 85116610435 scopus 로고    scopus 로고
    • Next century challenges: Mobile networking for smart dust
    • Aug.
    • J. Kahn, R. Katz, and K. Pister, "Next Century Challenges: Mobile Networking for Smart Dust," Proc. ACM MobiCom '99, Aug. 1999.
    • (1999) Proc. ACM MobiCom '99
    • Kahn, J.1    Katz, R.2    Pister, K.3
  • 6
    • 0242527321 scopus 로고    scopus 로고
    • The shared wireless infostation model - A new ad hoc networking paradigm (or where there is a whale, there is a way)
    • T. Small and Z. Haas, "The Shared Wireless Infostation Model - A New Ad Hoc Networking Paradigm (or Where there is a Whale, there is a Way)," Proc. ACM MobiHoc, 2003.
    • (2003) Proc. ACM MobiHoc
    • Small, T.1    Haas, Z.2
  • 10
    • 4444277059 scopus 로고    scopus 로고
    • A message ferrying approach for data delivery in sparse mobile ad hoc networks
    • W. Zhao, M. Ammar, and E. Zegura, "A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks," Proc. ACM MobiHoc, 2004.
    • (2004) Proc. ACM MobiHoc
    • Zhao, W.1    Ammar, M.2    Zegura, E.3
  • 11
    • 25844459686 scopus 로고    scopus 로고
    • Joint mobility and routing for lifetime elongation in wireless sensor networks
    • J. Luo and J.-P. Hubaux, "Joint Mobility and Routing for Lifetime Elongation in Wireless Sensor Networks," Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Luo, J.1    Hubaux, J.-P.2
  • 12
    • 33646575292 scopus 로고    scopus 로고
    • Exploiting mobility for energy efficient data collection in wireless sensor networks
    • S. Jain, R.C. Shah, W. Brunette, G. Borriello, and S. Roy, "Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks," Mobile Networks and Applications, vol. 11, no. 3, pp. 327-339, 2006.
    • (2006) Mobile Networks and Applications , vol.11 , Issue.3 , pp. 327-339
    • Jain, S.1    Shah, R.C.2    Brunette, W.3    Borriello, G.4    Roy, S.5
  • 15
    • 33750316239 scopus 로고    scopus 로고
    • Communication power optimization in a sensor network with a path-constrained mobile observer
    • Aug.
    • A. Chakrabarti, A. Sabharwal, and B. Aazhang, "Communication Power Optimization in a Sensor Network with a Path-Constrained Mobile Observer," ACM Trans. Sensor Networks, vol. 2, no. 3, pp. 297-324, Aug. 2006.
    • (2006) ACM Trans. Sensor Networks , vol.2 , Issue.3 , pp. 297-324
    • Chakrabarti, A.1    Sabharwal, A.2    Aazhang, B.3
  • 16
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • special issue on sensor network applications and protocols
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," AdHoc Networks J., special issue on sensor network applications and protocols, vol. 1, pp. 293-315, 2003.
    • (2003) AdHoc Networks J. , vol.1 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 21
    • 0020890723 scopus 로고
    • Non-public key distribution
    • D. Chaum, R.L. Rivest, and A.T. Sherman, eds. Plenum Publishing
    • R. Blom, "Non-Public Key Distribution," Advances in Cryptology - CRYPTO '82, D. Chaum, R.L. Rivest, and A.T. Sherman, eds., pp. 231-236, Plenum Publishing, 1982.
    • (1982) Advances in Cryptology - CRYPTO '82 , pp. 231-236
    • Blom, R.1
  • 23
    • 33646834914 scopus 로고    scopus 로고
    • A new approach for random key pre-distribution in large-scale wireless sensor networks
    • K. Ren, K. Zeng, and W. Lou, "A New Approach for Random Key Pre-Distribution in Large-Scale Wireless Sensor Networks," Wireless Comm. and Mobile Computing, vol. 6, no. 3, pp. 307-318, 2006.
    • (2006) Wireless Comm. and Mobile Computing , vol.6 , Issue.3 , pp. 307-318
    • Ren, K.1    Zeng, K.2    Lou, W.3
  • 24
    • 0017959977 scopus 로고
    • Secure communication over insecure channels
    • R. Merkle, "Secure Communication over Insecure Channels," Comm. ACM, vol. 21, no. 4, pp. 294-299, 1978.
    • (1978) Comm. ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.1
  • 26
    • 62849114245 scopus 로고    scopus 로고
    • An efficient key distribution scheme for establishing pairwise keys with a mobile sink in distributed sensor networks
    • Dec.
    • A.A. Rasheed and R.N. Mahapatra, "An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks," Proc. 27th IEEE Int'l Performance Computing and Comm. Conf. (IPCCC '08), pp. 264-270, Dec. 2008.
    • (2008) Proc. 27th IEEE Int'l Performance Computing and Comm. Conf. (IPCCC '08) , pp. 264-270
    • Rasheed, A.A.1    Mahapatra, R.N.2
  • 27
    • 75149183219 scopus 로고    scopus 로고
    • Key predistribution using combinational designs for grid-group deployment scheme in wireless sensor networks
    • Dec.
    • S. Ruj and B. Roy, "Key Predistribution Using Combinational Designs for Grid-Group Deployment Scheme in Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 6, no. 1, Dec. 2009.
    • (2009) ACM Trans. Sensor Networks , vol.6 , Issue.1
    • Ruj, S.1    Roy, B.2
  • 29
    • 67651048997 scopus 로고    scopus 로고
    • Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory
    • May
    • P. De, Y. Liu, and S.K. Das, "Deployment-Aware Modeling of Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory," ACM Trans. Sensor Networks, vol. 5, no. 3, May 2009.
    • (2009) ACM Trans. Sensor Networks , vol.5 , Issue.3
    • De, P.1    Liu, Y.2    Das, S.K.3
  • 30
    • 51849099823 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks
    • Aug.
    • H. Song, S. Zhu, W. Zhang, and G. Cao, "Least Privilege and Privilege Deprivation: Toward Tolerating Mobile Sink Compromises in Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 4, no. 4, Aug. 2008.
    • (2008) ACM Trans. Sensor Networks , vol.4 , Issue.4
    • Song, H.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 31
    • 42149172778 scopus 로고    scopus 로고
    • Group-based key predistribution for wireless sensor networks
    • Mar.
    • D. Liu, P. Ning, and W. Du, "Group-Based Key Predistribution for Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 4, no. 2, pp. 1-30, Mar. 2008.
    • (2008) ACM Trans. Sensor Networks , vol.4 , Issue.2 , pp. 1-30
    • Liu, D.1    Ning, P.2    Du, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.