메뉴 건너뛰기




Volumn 17, Issue 5, 2011, Pages 1217-1234

Public-key based access control in sensornet

Author keywords

[No Author keywords available]

Indexed keywords

COMMERCIAL OFF THE SHELVES; COMMUNICATION OVERHEADS; COMPUTATIONAL TIME; CRYPTOGRAPHIC PRIMITIVES; ELLIPTIC CURVE CRYPTOGRAPHY; KEY MANAGEMENT; MEMORY USAGE; MESSAGE COMPLEXITY; PAIRWISE KEY; PROCESSING TIME; PUBLIC KEYS; RECENT PROGRESS; REMOTE ACCESS CONTROL; SECURITY PROTOCOLS; SECURITY SCHEME; SENSOR DEVICE; SENSORNET; SYMMETRIC CRYPTOGRAPHY; SYMMETRIC KEYS; USER ACCESS CONTROL;

EID: 79959516675     PISSN: 10220038     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11276-011-0343-x     Document Type: Article
Times cited : (13)

References (36)
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • Boneh, D.; & Franlin, M. (2001). Identity-based encryption from the weil pairing. In CRYPTO, pp. 213-229. Berlin: Springer. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, California, May.
    • Chan, H.; Perrig, A.; & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE symposium on security and privacy, pp. 197-213, Berkeley, California, May.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 6
    • 24944474308 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks
    • Du, W.; & Deng, J. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. In ACM CCS.
    • (2003) ACM CCS
    • Du, W.1    Deng, J.2
  • 7
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • November.
    • Eschenauer, L.; & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In ACM CCS, November.
    • (2002) ACM CCS
    • Eschenauer, L.1    Gligor . V, D.2
  • 8
    • 0030415891 scopus 로고    scopus 로고
    • Security on the move: Indirect authentication using Kerberos
    • New York, November.
    • Fox, A.; & Gribble, S. D. (1996). Security on the move: Indirect authentication using Kerberos. In Mobicom, New York, November.
    • (1996) Mobicom
    • Fox, A.1    Gribble . S, D.2
  • 9
    • 27244436587 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and RSA on 8-bit CPUs
    • Cambridge, MA, August
    • Gura, N.; Patel, A.; Wander, A.; Eberle, H.; & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In CHES, Cambridge, MA, August.
    • (2004) CHES
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz . S, C.5
  • 10
    • 13244263673 scopus 로고    scopus 로고
    • Crossbow Technology INC
    • Crossbow Technology INC. Wireless sensor networks. http://www.xbow.com/.
    • Wireless Sensor Networks
  • 11
    • 26444574670 scopus 로고    scopus 로고
    • TinySec: A link layer security architecture for wireless sensor networks
    • Baltimore, MD, November
    • Karlof, C.; Sastry, N.; & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In SENSYS, Baltimore, MD, November.
    • (2004) SENSYS
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 12
    • 79959523138 scopus 로고    scopus 로고
    • Liu, A.; & Ning, P. (2005)
    • Liu, A.; & Ning, P. (2005) http://discovery.csc.ncsu.edu/software/ TinyECC/.
  • 13
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Washington, DC, October.
    • Liu, D.; & Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. In ACM CCS, Washington, DC, October.
    • (2003) ACM CCS
    • Liu, D.1    Ning, P.2
  • 15
    • 34247364655 scopus 로고    scopus 로고
    • Ultra-low power data storage for sensor networks
    • New York, NY, USA.
    • Mathur, G.; Desnoyers, P.; Ganesan, D.; & Shenoy, P. (2006). Ultra-low power data storage for sensor networks. In IPSN '06, New York, NY, USA.
    • (2006) IPSN '06
    • Mathur, G.1    Desnoyers, P.2    Ganesan, D.3    Shenoy, P.4
  • 16
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • 10.1109/35.312841
    • B. C. Neuman T. Ts'o 1994 Kerberos: An authentication service for computer networks IEEE Communications 32 9 33 38 10.1109/35.312841
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'O, T.2
  • 17
    • 79959529705 scopus 로고    scopus 로고
    • Key management guideline
    • NIST October
    • NIST. (2001). Key management guideline. In Workshop Document (DRAFT), October
    • (2001) Workshop Document (DRAFT)
  • 19
    • 84886501228 scopus 로고    scopus 로고
    • Efficient and resilient key discovery based on pseudo-random key pre-deployment
    • Di Pietro, R.; Mancini, L. V.; & Mei, A. (2006). Efficient and resilient key discovery based on pseudo-random key pre-deployment. Wireless Networks 12(6).
    • (2006) Wireless Networks , vol.12 , Issue.6
    • Di Pietro, R.1    Mancini . L, V.2    Mei, A.3
  • 21
    • 33847078464 scopus 로고    scopus 로고
    • Privacy enhanced access control in pervasive computing environments
    • October.
    • Ren, Kui, & Lou, Wenjing (2005). Privacy enhanced access control in pervasive computing environments. In Proceedings of BroadNet05, October.
    • (2005) Proceedings of BroadNet05
    • Ren1    Kui2    Lou3    Wenjing4
  • 22
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. (1979) How to share a secret. Communications of the ACM 22(11), 612-613
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 23
    • 4244026973 scopus 로고    scopus 로고
    • From Euclid's GCD to montgomery multiplication to the great divide
    • Sun Microsystems Laboratories TR-2001-95, June
    • Shantz, S. C. (2001). From Euclid's GCD to montgomery multiplication to the great divide. In Technical report, Sun Microsystems Laboratories TR-2001-95, June.
    • (2001) Technical Report
    • Shantz, S.C.1
  • 24
    • 79959502637 scopus 로고    scopus 로고
    • TinyOS 1.1.15.
    • TinyOS. TinyOS 1.1.15. http://www.tinyos.net, 2006.
    • (2006) TinyOS
  • 25
    • 33748968113 scopus 로고    scopus 로고
    • LIGER: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks
    • Uppsala, Sweden, June.
    • Traynor, P.; Kumar, R.; Saad, H. B.; Cao, G.; & Porta, T. L. (2006). LIGER: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks. In MOBISYS, Uppsala, Sweden, June.
    • (2006) MOBISYS
    • Traynor, P.1    Kumar, R.2    Saad . H, B.3    Cao, G.4    Porta . T, L.5
  • 27
    • 77954085269 scopus 로고    scopus 로고
    • Achieving robust message authentication in sensor networks: A public-key based approach
    • 10.1007/s11276-009-0184-z
    • H. Wang Q. Li 2010 Achieving robust message authentication in sensor networks: A public-key based approach ACM Journal of Wireless Networks (WINET) 16 4 999 1009 10.1007/s11276-009-0184-z
    • (2010) ACM Journal of Wireless Networks (WINET) , vol.16 , Issue.4 , pp. 999-1009
    • Wang, H.1    Li, Q.2
  • 28
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography based access control in sensor networks
    • Wang, H.; Sheng, B.; & Li, Q. (2006). Elliptic curve cryptography based access control in sensor networks. International Journal on Sensor Networks, 1(2).
    • (2006) International Journal on Sensor Networks , vol.1 , Issue.2
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 29
    • 51349093348 scopus 로고    scopus 로고
    • WM-ECC: An elliptic curve cryptography suite on sensor motes
    • College of William and Mary, Computer Science, Williamsburg, VA
    • Wang, H.; Sheng, B.; Tan, C.C.; & Li, Q. (2007). WM-ECC: An elliptic curve cryptography suite on sensor motes. Technical Report WM-CS-2007-11, College of William and Mary, Computer Science, Williamsburg, VA.
    • (2007) Technical Report WM-CS-2007-11
    • Wang, H.1    Sheng, B.2    Tan . C, C.3    Li, Q.4
  • 30
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • Ye, F.; Luo, H.; Lu, S.; & Zhang, L. (2004). Statistical en-route filtering of injected false data in sensor networks. In INFOCOM.
    • (2004) INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 31
    • 34848910920 scopus 로고    scopus 로고
    • Dimitrios Gunopulos, Walid A. Najjar. MicroHash: An efficient index structure for flash-based sensor devices
    • Zeinalipour-Yazti, D.; Lin, S.; & Kalogeraki, V. (2005). Dimitrios Gunopulos, Walid A. Najjar. MicroHash: An efficient index structure for flash-based sensor devices. In FAST.
    • (2005) FAST
    • Zeinalipour-Yazti, D.1    Lin, S.2    Kalogeraki, V.3
  • 32
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • Chicago, IL, May
    • Zhang, W.; Song, H.; Zhu, S.; & Cao, G. (2005). Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. In MOBIHOC, Chicago, IL, May.
    • (2005) MOBIHOC
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 33
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • DOI 10.1109/JSAC.2005.861382
    • Y. Zhang W. Liu W. Lou Y. Fang 2006 Location-based compromise-tolerant security mechanisms for wireless sensor networks IEEE Journal on Selected Areas in Communications 24 2 247 260 10.1109/JSAC.2005.861382 (Pubitemid 43269747)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 34
    • 24944483778 scopus 로고    scopus 로고
    • Securing sensor networks with location-based keys
    • New Orleans, Louisiana, March
    • Zhang, Y.; Liu, W.; Lou, W.; & Fang, Y. (2005). Securing sensor networks with location-based keys. In WCNC, New Orleans, Louisiana, March.
    • (2005) WCNC
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 35
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Washington D.C.; October
    • Zhu, S.; Setia, S.; & Jajodia, S. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In ACM CCS, Washington D.C.; October.
    • (2003) ACM CCS
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 36
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • Oakland, CA, May.
    • Zhu, S.; Setia, S.; Jajodia, S.; & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE symposium on security and privacy, Oakland, CA, May.
    • (2004) IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.