메뉴 건너뛰기




Volumn 55, Issue 10, 2011, Pages 2534-2544

A scalable and robust key pre-distribution scheme with network coding for sensor data storage

Author keywords

Distributed sensor data storage; Key pre distribution; Matrix decomposition; Network coding

Indexed keywords

COMMUNICATION PERFORMANCE; DISTRIBUTED SENSOR; INFORMATION EXCHANGES; KEY PRE-DISTRIBUTION; MATRIX DECOMPOSITION; SENSOR DATA;

EID: 79959372660     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2011.03.018     Document Type: Article
Times cited : (5)

References (31)
  • 1
    • 70349659577 scopus 로고    scopus 로고
    • Dependable and secure sensor data storage with dynamic integrity assurance
    • Q. Wang, K. Ren, W. Lou, Y. Zhang, "Dependable and secure sensor data storage with dynamic integrity assurance", in: Proc. IEEE INFOCOM, 2009, pp. 954-962.
    • (2009) Proc. IEEE INFOCOM , pp. 954-962
    • Wang, Q.1    Ren, K.2    Lou, W.3    Zhang, Y.4
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh, M. Franklin, "Identity-based encryption from the Weil pairing", in Proc. Crypto, 2001, pp. 213-229. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • DOI 10.1109/TMC.2006.16
    • N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha A study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Trans. Mobile Comput. 5 2 2006 128 143 (Pubitemid 43671073)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 6
    • 33750008721 scopus 로고    scopus 로고
    • Self-healing group key distribution with time-limited node revocation for wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.007, PII S1570870506000448, Security Issues in Sensor and Ad Hoc Networks
    • Y. Jiang, C. Lin, M. Shi, and X. Shen Seal-healing group key distribution with time-limited user revocation for wireless sensor networks Ad Hoc Netw. Elsevier 5 1 2007 14 23 (Pubitemid 44573003)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 14-23
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4
  • 9
    • 12444300139 scopus 로고    scopus 로고
    • Efficient and resilient key discovery based on pseudo-random key pre-deployment
    • R.D. Pietro, L.V. Mancini, A. Mei, Efficient and resilient key discovery based on pseudo-random key pre-deployment, in: Proc. IEEE IPDPS, 2004, pp. 217-224.
    • (2004) Proc. IEEE IPDPS , pp. 217-224
    • Pietro, R.D.1    Mancini, L.V.2    Mei, A.3
  • 10
    • 84943553152 scopus 로고    scopus 로고
    • Establishing pairwise key for secure communication in ad-hoc network: A probabilistic approach
    • S. Zhu, S. Xu, S. Setia, S. Jajodia, Establishing pairwise key for secure communication in ad-hoc network: a probabilistic approach, in: Proc. IEEE ICNP, 2003, pp. 326-335.
    • (2003) Proc. IEEE ICNP , pp. 326-335
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 11
    • 34547411877 scopus 로고    scopus 로고
    • A two-layer key establishment scheme for wireless sensor networks
    • DOI 10.1109/TMC.2007.1008
    • Y. Zhou, and Y. Fang A two-layer key establishment scheme for wireless sensor networks IEEE Trans. Mobile Comput. 6 9 2007 1009 1020 (Pubitemid 47171282)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.9 , pp. 1009-1020
    • Zhou, Y.1    Fang, Y.2
  • 12
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • W. Du, J. Deng, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Proc. IEEE INFOCOM, 2004, pp. 586-594.
    • (2004) Proc. IEEE INFOCOM , pp. 586-594
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 13
    • 24944580409 scopus 로고    scopus 로고
    • LLK: A link-layer key establishment scheme in wireless sensor networks
    • Y. Zhou, Y. Zhang, Y. Fang, LLK: a link-layer key establishment scheme in wireless sensor networks, in: Proc. IEEE WCNC, 2005, pp. 1912-1926.
    • (2005) Proc. IEEE WCNC , pp. 1912-1926
    • Zhou, Y.1    Zhang, Y.2    Fang, Y.3
  • 14
    • 52349091672 scopus 로고    scopus 로고
    • A key predistribution scheme with matrix decomposition for secure wireless sensor networks
    • H. Dai, H. Xu, A key predistribution scheme with matrix decomposition for secure wireless sensor networks, in: Proc. IEEE World Congr. Intell. Control Automat., 2008, pp. 1724-1727.
    • (2008) Proc. IEEE World Congr. Intell. Control Automat. , pp. 1724-1727
    • Dai, H.1    Xu, H.2
  • 15
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • R. Blom, An optimal class of symmetric key generation systems, in: Proc. ACM EUROCRYPT, 1985, pp. 335-338.
    • (1985) Proc. ACM EUROCRYPT , pp. 335-338
    • Blom, R.1
  • 16
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • D. Liu, P. Ning, and R. Li Establishing pairwise keys in distributed sensor networks ACM Trans. Inform. Syst. Security 8 1 2005 41 47
    • (2005) ACM Trans. Inform. Syst. Security , vol.8 , Issue.1 , pp. 41-47
    • Liu, D.1    Ning, P.2    Li, R.3
  • 17
    • 34247221952 scopus 로고    scopus 로고
    • Combinatorial design of key distribution mechanisms for wireless sensor networks
    • DOI 10.1109/TNET.2007.892879
    • S.A. Camptepe, and B. Yener Combinatorial design of key distribution mechanisms for wireless sensor networks IEEE/ACM Trans. Netw. 15 2 2007 346 358 (Pubitemid 46621615)
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.2 , pp. 346-358
    • Camtepe, S.A.1    Yener, B.2
  • 19
    • 65949089027 scopus 로고    scopus 로고
    • A multivariate key establishment scheme for wireless sensor networks
    • F. Delgosha, and F. Fekri A multivariate key establishment scheme for wireless sensor networks IEEE Trans. Wireless Commun. 8 4 2009 1814 1824
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.4 , pp. 1814-1824
    • Delgosha, F.1    Fekri, F.2
  • 21
    • 34548021406 scopus 로고    scopus 로고
    • A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
    • DOI 10.1016/j.comcom.2007.04.012, PII S014036640700165X
    • Y. Jiang, C. Lin, X. Shen, and M. Shi A DoS and fualt tolerant authentication protocol for group communications in ad hoc networks Comput. Commun., Elsevier 30 1 2007 2428 2441 (Pubitemid 47285282)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2428-2441
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4    Chu, X.5
  • 22
    • 33748600970 scopus 로고    scopus 로고
    • Multiple key sharing and distribution scheme with (n, t) threshold for NEMO group communications
    • DOI 10.1109/JSAC.2006.875114, 1688019
    • Y. Jiang, C. Lin, X. Shen, and M. Shi Multiple key sharing distribution scheme with (n, t) threshold memchanismfor NEMO group communications IEEE J. Selected Areas Commun. 24 9 2006 1738 1747 (Pubitemid 44376101)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.9 , pp. 1738-1747
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4
  • 23
    • 28844481518 scopus 로고    scopus 로고
    • Minimum-energy multicast in mobile ad hoc networks using network coding
    • DOI 10.1109/TCOMM.2005.857148
    • Y. Wu, P. Chou, and S. Kung Minimum-energy multicast in mobile ad hoc networks using network coding IEEE Trans. Commun. 53 11 2005 1906 1918 (Pubitemid 41763708)
    • (2005) IEEE Transactions on Communications , vol.53 , Issue.11 , pp. 1906-1918
    • Wu, Y.1    Chou, P.A.2    Kung, S.-Y.3
  • 24
    • 85032750989 scopus 로고    scopus 로고
    • Network coding for the internet and wireless networks
    • DOI 10.1109/MSP.2007.904818
    • P.A. Fragouli, and Y. Wu Network coding for internet and wireless networks IEEE Signal Process. Mag. 24 5 2007 77 85 (Pubitemid 350130507)
    • (2007) IEEE Signal Processing Magazine , vol.24 , Issue.5 , pp. 77-85
    • Chou, P.A.1    Wu, Y.2
  • 25
    • 77953319343 scopus 로고    scopus 로고
    • P-coding: Secure network coding against eavesdropping attacks
    • P. Zhang, Y. Jiang, C. Lin, Y. Fan, X. Shen, P-coding: secure network coding against eavesdropping attacks, in: Proc. IEEE INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Zhang, P.1    Jiang, Y.2    Lin, C.3    Fan, Y.4    Shen, X.5
  • 26
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis attacks in network coding
    • Y. Fan, Y. Jiang, H. Zhu, X. Shen, An efficient privacy-preserving scheme against traffic analysis attacks in network coding, in: Proc. IEEE INFOCOM, 2009, pp. 2213-2221.
    • (2009) Proc. IEEE INFOCOM , pp. 2213-2221
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.