메뉴 건너뛰기




Volumn 8, Issue 3-4, 2010, Pages 182-192

Securing wireless sensor networks: An identity-based cryptography approach

Author keywords

IBC; Identitybased cryptography; Key distribution; Security protocols; Wireless sensor networks; WSNs

Indexed keywords

ENERGY EFFICIENCY; NETWORK PROTOCOLS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 79960541794     PISSN: 17481279     EISSN: 17481287     Source Type: Journal    
DOI: 10.1504/IJSNET.2010.036193     Document Type: Article
Times cited : (14)

References (39)
  • 1
    • 33847698965 scopus 로고    scopus 로고
    • Efficient pairing computation on supersingular Abelian varieties
    • DOI 10.1007/s10623-006-9033-6
    • Barreto, P.S.L.M., Galbraith, S., O'Heigeartaigh, C. and Scott, M. (2007) 'Efficient pairing computation on supersingular abelian varieties', Designs, Codes and Cryptography, Vol. 42, pp.239-271. (Pubitemid 46384645)
    • (2007) Designs, Codes, and Cryptography , vol.42 , Issue.3 , pp. 239-271
    • Barreto, P.S.L.M.1    Galbraith, S.D.2    O'Heigeartaigh, C.3    Scott, M.4
  • 5
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D. and Franklin, M. (2003) 'Identity-based encryption from the weil pairing', SIAM J. Comput., Vol. 32, No. 3, pp.586-615.
    • (2003) Siam J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 6
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • January-March 2003
    • Capkun, S., Buttyán, L. and Hubaux, J-P. (2003) 'Self-organized public-key management for mobile ad hoc networks', IEEE Transactions on Mobile Computing, January-March 2003, Vol. 2, No. 1, pp.52-64.
    • (2003) IEEE Transactions on Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyán, L.2    Hubaux, J.-P.3
  • 8
    • 20544465010 scopus 로고    scopus 로고
    • Crossbow Technology, December 2003, Crossbow Technology Inc., 41 Daggett Dr., San Jose, CA 95134
    • Crossbow Technology (2003) MPR/MIB Mote Hardware Users Manual, December 2003, Crossbow Technology Inc., 41 Daggett Dr., San Jose, CA 95134.
    • (2003) MPR/MIB Mote Hardware Users Manual
  • 9
    • 33745726712 scopus 로고    scopus 로고
    • Security considerations and key negotiation techniques for power constrained sensor networks
    • Doyle, B., Bell, S., Smeaton, A.F., McCusker, K. and O'Connor, N. (2006) 'Security considerations and key negotiation techniques for power constrained sensor networks', The Computer Journal, Vol. 49, No. 4, pp.443-453.
    • (2006) The Computer Journal , vol.49 , Issue.4 , pp. 443-453
    • Doyle, B.1    Bell, S.2    Smeaton, A.F.3    McCusker, K.4    O'Connor, N.5
  • 10
    • 29844457287 scopus 로고    scopus 로고
    • An efficient scheme for authenticating public keys in sensor networks
    • DOI 10.1145/1062689.1062698, MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
    • Du, W., Wang, R. and Ning, P. (2005) 'An efficient scheme for authenticating public keys in sensor networks', Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05), 25-27 May 2005, Urbana-Champaign, IL, USA, pp.58-67. (Pubitemid 43037583)
    • (2005) Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) , pp. 58-67
    • Du, W.1    Wang, R.2    Ning, P.3
  • 18
    • 70049104722 scopus 로고    scopus 로고
    • Available online at
    • Imote2 datasheet (2008). Available online at: http://www.xbow.com.
    • (2008) Imote2 Datasheet
  • 22
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • Liu, D. and Ning, P. (2003) 'Establishing pairwise keys in distributed sensor networks', Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), Washington DC, pp.52-61. (Pubitemid 40673788)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 27
    • 44049105799 scopus 로고    scopus 로고
    • Moteiv, Available online at
    • Moteiv (2006) Tmote Sky datasheet. Available online at: http://www.moteiv.com.
    • (2006) Tmote Sky Datasheet
  • 34
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Santa Barbara, CA
    • Shamir, A. (1985) 'Identity-based cryptosystems and signature schemes', Proceedings of CRYPTO 84 on Advances in Cryptology, Santa Barbara, CA, pp.47-53.
    • (1985) Proceedings of CRYPTO 84 on Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 38
    • 51349098629 scopus 로고    scopus 로고
    • Id-based key agreement and encryption for wireless sensor networks
    • Yang, G., Rong, C., Veigner, C. and Cheng, H. (2006) 'Id-based key agreement and encryption for wireless sensor networks', IJCSNS, Vol. 6, No. 5B.
    • (2006) Ijcsns , vol.6 , Issue.5 B
    • Yang, G.1    Rong, C.2    Veigner, C.3    Cheng, H.4
  • 39
    • 70449124369 scopus 로고    scopus 로고
    • ZigBee-Alliance, Available online a
    • ZigBee-Alliance (2005) Zigbee specification 1.1. Available online at: http://www.zigbee.org.
    • (2005) Zigbee Specification 1.1.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.