메뉴 건너뛰기




Volumn 2, Issue 1-2, 2007, Pages 109-121

End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks

Author keywords

key pre distribution; node disjoint path; security; wireless sensor networks (WSNs)

Indexed keywords


EID: 79551646922     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2007.012829     Document Type: Article
Times cited : (14)

References (33)
  • 3
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • NAI Labs, September
    • Carman, W.D., Kruus, S.P. and Matt, J.B. (2000) ‘Constraints and approaches for distributed sensor network security’, Technical Report 00-010, NAI Labs, September.
    • (2000) Technical Report 00-010
    • Carman, W.D.1    Kruus, S.P.2    Matt, J.B.3
  • 4
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: peer intermediaries for key establishment in sensor networks
    • Miami, March
    • Chan, H. and Perrig, A. (2005) ‘PIKE: peer intermediaries for key establishment in sensor networks’, IEEE INFOCOM 2005, Miami, March.
    • (2005) IEEE INFOCOM 2005
    • Chan, H.1    Perrig, A.2
  • 6
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • Hongkong, China, March
    • Du, W., Deng, J., Han, S.Y., Chen, S. and Varshney, K.P. (2004) ‘A key management scheme for wireless sensor networks using deployment knowledge’, IEEE INFOCOM 2004, Hongkong, China, March.
    • (2004) IEEE INFOCOM 2004
    • Du, W.1    Deng, J.2    Han, S.Y.3    Chen, S.4    Varshney, K.P.5
  • 11
    • 25844461930 scopus 로고    scopus 로고
    • Distributed algorithms for secure multipath routing
    • Miami, March
    • Lee, P., Misra, V. and Rubenstein, D. (2005) ‘Distributed algorithms for secure multipath routing’, IEEE INFOCOM 2005, Miami, March.
    • (2005) IEEE INFOCOM 2005
    • Lee, P.1    Misra, V.2    Rubenstein, D.3
  • 12
    • 0034844688 scopus 로고    scopus 로고
    • Split multipath routing with maximally disjoint paths in ad hoc networks
    • Helsinki, Finland, June
    • Lee, S. and Gerla, M. (2001) ‘Split multipath routing with maximally disjoint paths in ad hoc networks’, IEEE International Conference on Communications (ICC’01), Helsinki, Finland, June.
    • (2001) IEEE International Conference on Communications (ICC’01)
    • Lee, S.1    Gerla, M.2
  • 14
    • 33846621980 scopus 로고    scopus 로고
    • End-to-end pairwise key establishment using multi-path in wireless sensor network
    • St. Louis, MO, November
    • Ling, H. and Znati, T. (2005) ‘End-to-end pairwise key establishment using multi-path in wireless sensor network’, The 2005 IEEE Global Communications Conference(GLOBECOM 2005), St. Louis, MO, November.
    • (2005) The 2005 IEEE Global Communications Conference(GLOBECOM 2005)
    • Ling, H.1    Znati, T.2
  • 17
    • 33749033368 scopus 로고    scopus 로고
    • Group-based key pre-distribution in wireless sensor networks
    • Cologne, Germany, September
    • Liu, D., Ning, P. and Du, W. (2005) ‘Group-based key pre-distribution in wireless sensor networks’, ACM Workshop on Wireless Security (Wise’05), Cologne, Germany, September.
    • (2005) ACM Workshop on Wireless Security (Wise’05)
    • Liu, D.1    Ning, P.2    Du, W.3
  • 18
    • 4444237581 scopus 로고    scopus 로고
    • SPREAD: enhancing data confidentiality in mobile ad hoc networks
    • Hongkong, China, March
    • Lou, W., Liu, W. and Fang, Y. (2004) ‘SPREAD: enhancing data confidentiality in mobile ad hoc networks’, IEEE INFOCOM 2004, Hongkong, China, March.
    • (2004) IEEE INFOCOM 2004
    • Lou, W.1    Liu, W.2    Fang, Y.3
  • 19
    • 0035425905 scopus 로고    scopus 로고
    • Performance of multipath routing for on-demand protocols in mobile ad hoc networks
    • Kluwer Academic Publisher.
    • Nasipuri, A. and Castaneda, R. (2001) ‘Performance of multipath routing for on-demand protocols in mobile ad hoc networks’, Mobile Networks and Applications, Kluwer Academic Publisher.
    • (2001) Mobile Networks and Applications
    • Nasipuri, A.1    Castaneda, R.2
  • 20
    • 8344255723 scopus 로고    scopus 로고
    • Efficient algorithms for computing disjoint QoS paths
    • Hongkong, China, March
    • Orda, A. and Sprintson, A. (2004) ‘Efficient algorithms for computing disjoint QoS paths’, IEEE INFOCOM 2004, Hongkong, China, March.
    • (2004) IEEE INFOCOM 2004
    • Orda, A.1    Sprintson, A.2
  • 22
    • 84907567978 scopus 로고    scopus 로고
    • Improving the performance of query-based routing protocols through “Diversity Injection”
    • New Orleans, LA, September
    • Pearlman, R.M. and Haas, J.Z. (1999) ‘Improving the performance of query-based routing protocols through “Diversity Injection”’, IEEE Wireless Communications and Networking Conference 99, New Orleans, LA, September.
    • (1999) IEEE Wireless Communications and Networking Conference 99
    • Pearlman, R.M.1    Haas, J.Z.2
  • 23
    • 34347349933 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector routing
    • New Orleans, LA, February
    • Perkins, E.C. and Royer, M.E. (1999) ‘Ad hoc on-demand distance vector routing’, IEEE WMCSA’99, New Orleans, LA, February.
    • (1999) IEEE WMCSA’99
    • Perkins, E.C.1    Royer, M.E.2
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • Shamir, A. (1979) ‘How to share a secret’, Communications of ACM, November, Vol. 22, No. 11, pp.612–613.
    • (1979) Communications of ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 26
    • 0001636850 scopus 로고
    • Kerberos: an authentication service for computer networks
    • Dallas, TX, January
    • Steiner, J., Neuman, C. and Schiller, J. (1988) ‘Kerberos: an authentication service for computer networks’, Usenix Winter Conference, Dallas, TX, January.
    • (1988) Usenix Winter Conference
    • Steiner, J.1    Neuman, C.2    Schiller, J.3
  • 27
    • 24944442139 scopus 로고    scopus 로고
    • A robust group-based key management scheme for wireless sensor networks
    • New Orleans, LA, March
    • Yu, Z. and Guan, Y. (2005) ‘A robust group-based key management scheme for wireless sensor networks’, IEEE Wireless Communications and Networking Conference 2005, New Orleans, LA, March.
    • (2005) IEEE Wireless Communications and Networking Conference 2005
    • Yu, Z.1    Guan, Y.2
  • 29
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach
    • Miami, March
    • Zhang, W. and Cao, G. (2005) ‘Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach’, IEEE INFOCOM 2005, Miami, March.
    • (2005) IEEE INFOCOM 2005
    • Zhang, W.1    Cao, G.2
  • 31
    • 84952952255 scopus 로고    scopus 로고
    • Dividing a key into multiple fragments is only an example approach of splitting the key into fragments, the major property of the splitting method is that all key fragments are required in order to re-generate the secure key
    • Dividing a key into multiple fragments is only an example approach of splitting the key into fragments, the major property of the splitting method is that all key fragments are required in order to re-generate the secure key.
  • 32
    • 84952956662 scopus 로고    scopus 로고
    • During the analysis, we assume that the source and destination node will not be compromised, thus they are not counted in the total number of nodes n
    • During the analysis, we assume that the source and destination node will not be compromised, thus they are not counted in the total number of nodes n.
  • 33
    • 85088188003 scopus 로고    scopus 로고
    • s means there are s paths with the same hop count l in this set
    • s means there are s paths with the same hop count l in this set.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.