메뉴 건너뛰기




Volumn 4, Issue 2, 2011, Pages 162-180

An efficient random key distribution scheme for large-scale distributed sensor networks

Author keywords

Key establishment; Key pre distribution; Pseudo random function; Security; Sensor networks

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; NETWORK ARCHITECTURE; SENSOR NETWORKS; SENSOR NODES;

EID: 79251556858     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.123     Document Type: Article
Times cited : (23)

References (31)
  • 1
    • 84947616705 scopus 로고    scopus 로고
    • Crossbow Technology Inc. Wireless sensor networks.
    • Crossbow Technology Inc. Wireless sensor networks.
  • 3
    • 79251554556 scopus 로고    scopus 로고
    • AES proposal: Rijndael. In AES Round 1 Technical Evaluation, CD-1: Documentation NIST, August
    • Daemen J, Rijmen V. AES proposal: Rijndael. In AES Round 1 Technical Evaluation, CD-1: Documentation NIST, August 1998.
    • (1998)
    • Daemen, J.1    Rijmen, V.2
  • 4
    • 79251540439 scopus 로고    scopus 로고
    • Cryptography and Network Security: Principles and Practices (3rd edn). Pearson Education India.
    • Stallings W. Cryptography and Network Security: Principles and Practices (3rd edn). Pearson Education India, 2003.
    • (2003)
    • Stallings, W.1
  • 5
    • 0001826463 scopus 로고
    • The RC5 encryption algorithm
    • Rivest RL. The RC5 encryption algorithm. Dr. Dobb's Journal 1995; 20 (1): 146-148.
    • (1995) Dr. Dobb's Journal , vol.20 , Issue.1 , pp. 146-148
    • Rivest, R.L.1
  • 6
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy Berkeley, California, -
    • Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy Berkeley, California, 2003; 197-213.
    • (2003) , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 7
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: efficient security mechanisms for large-scale distributed sensor networks
    • Zhu S, Setia S, Jajodia S. LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2006; 2 (4): 500-528.
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 8
    • 33750351971 scopus 로고    scopus 로고
    • A key management scheme for large scale distributed sensor networks. In Proceedings of the IFIP TC6 11th International Conference PWC 2006, Lecture Notes in Computer Science, Springer-Verlag, Albacete, Spain, 20-22 September.
    • Kim YH, Lee H, Lee DH, Lim J. A key management scheme for large scale distributed sensor networks. In Proceedings of the IFIP TC6 11th International Conference PWC 2006, Lecture Notes in Computer Science, vol. 4217, Springer-Verlag, Albacete, Spain, 20-22 September 2006; 437-446.
    • (2006) , vol.4217 , pp. 437-446
    • Kim, Y.H.1    Lee, H.2    Lee, D.H.3    Lim, J.4
  • 9
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems. In Proceeding of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques Lecture Notes in Computer Science, Paris, France, Springer-Verlag.
    • Blom R. An optimal class of symmetric key generation systems. In Proceeding of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques Lecture Notes in Computer Science, vol. 209, Paris, France, Springer-Verlag, 1985; 335-338.
    • (1985) , vol.209 , pp. 335-338
    • Blom, R.1
  • 10
    • 84989455644 scopus 로고
    • On the key predistribution system: a practical solution to the key distribution problem. In Proceedings of the CRYPTO 1987, Lecture Notes in Computer Science, Springer-Verlag.
    • Matsumoto T, Imai H. On the key predistribution system: a practical solution to the key distribution problem. In Proceedings of the CRYPTO 1987, Lecture Notes in Computer Science, vol. 293, Springer-Verlag, 1987; 185-193.
    • (1987) , vol.293 , pp. 185-193
    • Matsumoto, T.1    Imai, H.2
  • 11
    • 0025212474 scopus 로고
    • A matrix key-distribution scheme
    • Gong L, Wheeler DJ. A matrix key-distribution scheme. Journal of Cryptology 1990; 2 (1): 51-59.
    • (1990) Journal of Cryptology , vol.2 , Issue.1 , pp. 51-59
    • Gong, L.1    Wheeler, D.J.2
  • 14
    • 0038341106 scopus 로고    scopus 로고
    • A key management scheme for distributed sensor networks. In The 9th ACM Conference on Computer and Communication Security November.
    • Eschenauer L, Gligor VD. A key management scheme for distributed sensor networks. In The 9th ACM Conference on Computer and Communication Security November 2002; 41-47.
    • (2002) , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 15
    • 33745289967 scopus 로고    scopus 로고
    • Key forwarding: a location-adaptive key-establishment scheme for wireless sensor networks. In International Workshop on Distributed Computing (IWDC 2005), LNCS 3741.
    • Das AK, Das A, Mohapatra S, Vavilapalli S. Key forwarding: a location-adaptive key-establishment scheme for wireless sensor networks. In International Workshop on Distributed Computing (IWDC 2005), LNCS 3741 2005; 404-409.
    • (2005) , pp. 404-409
    • Das, A.K.1    Das, A.2    Mohapatra, S.3    Vavilapalli, S.4
  • 17
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge. In 23rd Conference of the IEEE Communications Society (Infocom'04) Hong Kong, China, 21-25 March.
    • Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In 23rd Conference of the IEEE Communications Society (Infocom'04) Hong Kong, China, 21-25 March 2004; 586-597.
    • (2004) , pp. 586-597
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 18
    • 4544301464 scopus 로고    scopus 로고
    • Di, Random key-assignment for secure wireless sensor networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks October.
    • Di Pietro R, Mancini LV, Mei A. Random key-assignment for secure wireless sensor networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks October 2003; 62-71.
    • (2003) , pp. 62-71
    • Pietro, R.1    Mancini, L.V.2    Mei, A.3
  • 19
    • 0842289248 scopus 로고    scopus 로고
    • Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks. In IEEE Global Telecommunications Conference, 2003 (GLOBECOM 03).
    • Ramkumar M, Memon N, Simha R. Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks. In IEEE Global Telecommunications Conference, 2003 (GLOBECOM 03) vol. 3, 2003; 1405-1409.
    • (2003) , vol.3 , pp. 1405-1409
    • Ramkumar, M.1    Memon, N.2    Simha, R.3
  • 20
    • 15244360279 scopus 로고    scopus 로고
    • An efficient random key pre-distribution scheme for MANET security
    • Ramkumar M, Memon N. An efficient random key pre-distribution scheme for MANET security. IEEE Journal on Selected Areas in Communications 2005; 23 (3): 611-621.
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.3 , pp. 611-621
    • Ramkumar, M.1    Memon, N.2
  • 21
    • 46749158359 scopus 로고    scopus 로고
    • An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks
    • Das AK. An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks. International Journal of Network Security (IJNS), 2008; 6 (2): 134-144.
    • (2008) International Journal of Network Security (IJNS) , vol.6 , Issue.2 , pp. 134-144
    • Das, A.K.1
  • 23
    • 31844436263 scopus 로고    scopus 로고
    • A study of static versus dynamic keying schemes in sensor networks. In ACM Workshop on performance evaluation of Wireless Ad-hoc, Sensor and Ubiquitous Networks (PE-WASUN 2005) Montreal, Candas, October.
    • Moharrum M, Eltoweissy M. A study of static versus dynamic keying schemes in sensor networks. In ACM Workshop on performance evaluation of Wireless Ad-hoc, Sensor and Ubiquitous Networks (PE-WASUN 2005) Montreal, Candas, October 2005; 122-129.
    • (2005) , pp. 122-129
    • Moharrum, M.1    Eltoweissy, M.2
  • 24
    • 84866860550 scopus 로고    scopus 로고
    • Improving key pre-distribution with deployment knowledge in static sensor networks
    • Liu D, Ning P. Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 2005; 1 (2): 204-239.
    • (2005) ACM Transactions on Sensor Networks , vol.1 , Issue.2 , pp. 204-239
    • Liu, D.1    Ning, P.2
  • 25
    • 33749033368 scopus 로고    scopus 로고
    • Group-based key pre-distribution in wireless sensor networks. In Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005) September
    • Liu D, Ning P, Du W. Group-based key pre-distribution in wireless sensor networks. In Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005) September 2005.
    • (2005)
    • Liu, D.1    Ning, P.2    Du, W.3
  • 26
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS) Washington DC, 27--31 October.
    • Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS) Washington DC, 27--31 October 2003; 52-61.
    • (2003) , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 27
    • 28444454523 scopus 로고    scopus 로고
    • SECK: Survivable and efficient clustered keying for wireless sensor networks. In IEEE Workshop on Information Assurance in Wireless Sensor Networks, WSNIA005 April.
    • Chorzempa M, Park JM, Eltoweissy M. SECK: Survivable and efficient clustered keying for wireless sensor networks. In IEEE Workshop on Information Assurance in Wireless Sensor Networks, WSNIA005 April 2005; 453-458.
    • (2005) , pp. 453-458
    • Chorzempa, M.1    Park, J.M.2    Eltoweissy, M.3
  • 29
    • 0017959977 scopus 로고
    • Secure communication over insecure channels
    • Merkle R. Secure communication over insecure channels. Communications of the ACM 1978; 21 (4): 294-299.
    • (1978) Communications of the ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.1
  • 31
    • 79251558967 scopus 로고
    • Secure hash standard. FIPS PUB 180-1 National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April
    • Secure hash standard. FIPS PUB 180-1 National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995.
    • (1995)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.