메뉴 건너뛰기




Volumn 4, Issue 2, 2011, Pages 109-121

Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks

Author keywords

Attacks; Key pre distribution schemes; Key swapping; Security; Sensor networks

Indexed keywords

SENSOR NETWORKS; SENSOR NODES;

EID: 79251536864     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.106     Document Type: Article
Times cited : (5)

References (22)
  • 1
    • 37849028668 scopus 로고    scopus 로고
    • A random perturbation-based scheme for pairwise key establishment in sensor networks. In Proceedings of 8th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc '07), Montreal, Quebec, Canada, -
    • Zhang W, Tran M, Zhu S, Cao G. A random perturbation-based scheme for pairwise key establishment in sensor networks. In Proceedings of 8th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc '07), Montreal, Quebec, Canada, 2007; 90-99.
    • (2007) , pp. 90-99
    • Zhang, W.1    Tran, M.2    Zhu, S.3    Cao, G.4
  • 2
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks. In Proceedings of 9th ACM Conference on Computer and Communications Security (CSS '02), Washington, DC, U.S.A., -
    • Eschenauer L, Gligor V. A key-management scheme for distributed sensor networks. In Proceedings of 9th ACM Conference on Computer and Communications Security (CSS '02), Washington, DC, U.S.A., 2002; 41-47.
    • (2002) , pp. 41-47
    • Eschenauer, L.1    Gligor, V.2
  • 3
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (S&P '03), -
    • Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (S&P '03), 2003; 197-213.
    • (2003) , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 4
    • 67549091275 scopus 로고    scopus 로고
    • Efficient ID-based threshold random key pre-distribution scheme for wireless sensor networks
    • Dai TT, Hong CS. Efficient ID-based threshold random key pre-distribution scheme for wireless sensor networks. IEICE Transactions on Communications 2008; E91-B(8): 2602-2609.
    • (2008) IEICE Transactions on Communications , vol.91 E-B , Issue.8 , pp. 2602-2609
    • Dai, T.T.1    Hong, C.S.2
  • 7
    • 33750342024 scopus 로고    scopus 로고
    • A collusion attack on pairwise key predistribution schemes for distributed sensor networks. In Proceedings of 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '06), March.
    • Moore T. A collusion attack on pairwise key predistribution schemes for distributed sensor networks. In Proceedings of 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '06), March 2006; 13-17.
    • (2006) , pp. 13-17
    • Moore, T.1
  • 8
    • 0037615371 scopus 로고    scopus 로고
    • The Strange Logic of Random Graphs
    • Berlin: Springer-Verlag.
    • Spencer J. The Strange Logic of Random Graphs, Vol. 22. Berlin: Springer-Verlag: 2001.
    • (2001) , vol.22
    • Spencer, J.1
  • 9
    • 79251584221 scopus 로고    scopus 로고
    • C.T. Inc. Wireless Sensor Networks Product Reference Guide.
    • C.T. Inc. Wireless Sensor Networks Product Reference Guide, 2007.
    • (2007)
  • 10
    • 17744386714 scopus 로고    scopus 로고
    • Key infection: smart trust for smart dust. In Proceedings of 12th IEEE International Conference on Network Protocols (ICNP '04), -
    • Anderson R, Chan H, Perrig A. Key infection: smart trust for smart dust. In Proceedings of 12th IEEE International Conference on Network Protocols (ICNP '04), 2004; 206-215.
    • (2004) , pp. 206-215
    • Anderson, R.1    Chan, H.2    Perrig, A.3
  • 11
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: efficient security mechanisms for large-scale distributed sensor networks
    • Zhu S, Setia S, Jajodia S. LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2006; 2: 500-528.
    • (2006) ACM Transactions on Sensor Networks , vol.2 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 12
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In Proceedings of IEEE INFOCOM '05, -
    • Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In Proceedings of IEEE INFOCOM '05, 2005; 503-514.
    • (2005) , pp. 503-514
    • Zhang, W.1    Cao, G.2
  • 13
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (S&P '05), -
    • Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (S&P '05), 2005; 49-63.
    • (2005) , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 14
    • 39049172951 scopus 로고    scopus 로고
    • Replication attack on random key pre-distribution schemes for wireless sensor networks
    • Fu H, Kawamura S, Zhang M, Zhang L. Replication attack on random key pre-distribution schemes for wireless sensor networks. Computer Communication 2008; 31: 842-857.
    • (2008) Computer Communication , vol.31 , pp. 842-857
    • Fu, H.1    Kawamura, S.2    Zhang, M.3    Zhang, L.4
  • 15
    • 84944878354 scopus 로고    scopus 로고
    • Handbook of Applied Cryptography
    • CRC Press, Inc. Boca Raton, FL.
    • Menezes A, Van-Oorschot P, Vanstone S. Handbook of Applied Cryptography. CRC Press, Inc. Boca Raton, FL: 1996.
    • (1996)
    • Menezes, A.1    Van-Oorschot, P.2    Vanstone, S.3
  • 16
    • 0031624874 scopus 로고    scopus 로고
    • Perfectly one-way probablistic hash functions. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC '98), 23-26 May.
    • Canetti R, Micciancio D, Reingold O. Perfectly one-way probablistic hash functions. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC '98), 23-26 May 1998; 131-140.
    • (1998) , pp. 131-140
    • Canetti, R.1    Micciancio, D.2    Reingold, O.3
  • 17
    • 27544515049 scopus 로고    scopus 로고
    • Internet Security: Cryptographic Principles, Algorithms, and Protocols
    • Wiley Hoboken, NJ.
    • Rhee MY. Internet Security: Cryptographic Principles, Algorithms, and Protocols. Wiley Hoboken, NJ: 2003.
    • (2003)
    • Rhee, M.Y.1
  • 18
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM '04, -
    • Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM '04, 2004; 586-597.
    • (2004) , pp. 586-597
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 19
    • 84866860550 scopus 로고    scopus 로고
    • Improving key predistribution with deployment knowledge in static sensor networks
    • Liu D, Ning P. Improving key predistribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 2005; 1: 204-239.
    • (2005) ACM Transactions on Sensor Networks , vol.1 , pp. 204-239
    • Liu, D.1    Ning, P.2
  • 20
    • 51349133693 scopus 로고    scopus 로고
    • RoK: a robust key pre-distribution protocol for multi-phase wireless sensor network. In Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (SecureComm '07), Nice, France, September.
    • Castelluccia C, Spognardi A. RoK: a robust key pre-distribution protocol for multi-phase wireless sensor network. In Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (SecureComm '07), Nice, France, September 2007; 351-360.
    • (2007) , pp. 351-360
    • Castelluccia, C.1    Spognardi, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.