메뉴 건너뛰기




Volumn 2011, Issue , 2011, Pages

A new design of access control in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL PROTOCOL; BANDWIDTH SAVINGS; DYNAMIC ACCESS CONTROL; ELLIPTIC CURVE CRYPTOGRAPHY; KEY ESTABLISHMENTS; KEY GENERATION; MALICIOUS ATTACK; MALICIOUS NODES; NEW DESIGN; NODE DEPLOYMENT; SECRET KEY; SECURE WIRELESS SENSOR NETWORKS;

EID: 79959266313     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2011/412146     Document Type: Article
Times cited : (25)

References (29)
  • 2
    • 8544280003 scopus 로고    scopus 로고
    • Biosensors for environmental monitoring: A global perspective
    • Rodriguez-Mozaz S., Alda M. J. L. D., Marco M. P., Barcel D., Biosensors for environmental monitoring: a global perspective Talanta 2005 65 2 291 297
    • (2005) Talanta , vol.65 , Issue.2 , pp. 291-297
    • Rodriguez-Mozaz, S.1    Alda, M.J.L.D.2    Marco, M.P.3    Barcel, D.4
  • 3
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • Liu D., Ning P., Establishing pairwise keys in distributed sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) October 2003 52 61 (Pubitemid 40673788)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 10
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • Parno B., Perrig A., Gligor V., Distributed detection of node replication attacks in sensor networks Proveedings of IEEE Symposium on Security and Privacy May 2005 49 63 (Pubitemid 41543646)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 11
    • 33750012404 scopus 로고    scopus 로고
    • Access control in wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
    • Zhou Y., Zhang Y., Fang Y., Access control in wireless sensor networks Ad Hoc Networks 2007 5 1 3 13 (Pubitemid 44573007)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 3-13
    • Zhou, Y.1    Zhang, Y.2    Fang, Y.3
  • 12
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • Zhu S., Setia S., Jajodia S., LEAP: efficient security mechanisms for large-scale distributed sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) October 2003 62 72 (Pubitemid 40673789)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 13
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • DOI 10.1145/1218556.1218559
    • Zhu S., Setia S., Jajodia S., LEAP+: efficient security mechanisms for large-scale distributed sensor networks ACM Transactions on Sensor Networks 2006 2 4 500 528 (Pubitemid 46278640)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A., How to share a secret Communications of the ACM 1979 22 11 612 613
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • DOI 10.1145/359340.359342
    • Rivest R. L., Shamir A., Adleman L., A method for obtaining digital signatures and public key cryptosystems Communications of the ACM 1978 21 2 120 126 (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 17
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N., Elliptic curve cryptosystems Mathematics of Computation 1987 48 203 209
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 27
    • 79959212819 scopus 로고    scopus 로고
    • Atmel Corporation
    • Atmel Corporation,. http://www.atmel.com/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.