메뉴 건너뛰기




Volumn 24 LNICST, Issue , 2010, Pages 66-82

A forward and backward secure key management in wireless sensor networks for PCS/SCADA

Author keywords

Forward and backward secrecy; Key management; Process control systems; Supervisory control and data acquisition; Wireless sensor network

Indexed keywords

FORWARD AND BACKWARD SECRECY; KEY MANAGEMENT; NODE CAPTURE ATTACK; SECURE KEY MANAGEMENT; SENSOR APPLICATIONS; SUPERVISORY CONTROL AND DATA ACQUISITION; WIRELESS SENSOR;

EID: 80052561084     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-11528-8_6     Document Type: Conference Paper
Times cited : (16)

References (17)
  • 1
    • 17744384943 scopus 로고    scopus 로고
    • Key management for SCADA
    • Sandia National Laboratories - Cryptography and Information Systems Surety Department March
    • Beaver, C., Gallup, D., Neumann, W., Torgerson, M.: Key management for SCADA. Technical Report SAND2001-3252, Sandia National Laboratories - Cryptography and Information Systems Surety Department (March 2002)
    • (2002) Technical Report SAND2001-3252
    • Beaver, C.1    Gallup, D.2    Neumann, W.3    Torgerson, M.4
  • 2
    • 84872800478 scopus 로고    scopus 로고
    • SKMA: A key management architecture for SCADA systems
    • Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C., Susilo, W. (eds.). Australian Computer Society
    • Dawson, R., Boyd, C., Dawson, E., González Nieto, J.M.: SKMA: a key management architecture for SCADA systems. In: Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C., Susilo, W. (eds.) ACSW Frontiers. CRPIT, vol. 54, pp. 183-192. Australian Computer Society (2006)
    • (2006) ACSW Frontiers. CRPIT , vol.54 , pp. 183-192
    • Dawson, R.1    Boyd, C.2    Dawson, E.3    González Nieto, J.M.4
  • 3
    • 84969368443 scopus 로고
    • An identity-based key-exchange protocol
    • Quisquater, J.-J., Vandewalle, J. (eds.). Springer, Heidelberg
    • Günther, C.G.: An identity-based key-exchange protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 29-37. Springer, Heidelberg (1990)
    • (1990) EUROCRYPT 1989. LNCS , vol.434 , pp. 29-37
    • Günther, C.G.1
  • 4
    • 33745639957 scopus 로고    scopus 로고
    • Node compromise in sensor networks: The need for secure systems
    • University of Colorado at Boulder - Department of Computer Science January
    • Hartung, C., Balasalle, J., Han, R.: Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-990-05, University of Colorado at Boulder - Department of Computer Science (January 2005)
    • (2005) Technical Report CU-CS-990-05
    • Hartung, C.1    Balasalle, J.2    Han, R.3
  • 5
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI 10.1016/S1570-8705(03)00008-8
    • Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3), 293-315 (2003) (Pubitemid 40421415)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 6
    • 38349039331 scopus 로고    scopus 로고
    • Forward-secure key evolution in wireless sensor networks
    • Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.). Springer, Heidelberg
    • Klonowski, M., Kutylowski, M., Ren, M., Rybarczyk, K.: Forward-secure key evolution in wireless sensor networks. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 102-120. Springer, Heidelberg (2007)
    • (2007) CANS 2007. LNCS , vol.4856 , pp. 102-120
    • Klonowski, M.1    Kutylowski, M.2    Ren, M.3    Rybarczyk, K.4
  • 7
    • 0019634370 scopus 로고
    • Password authentification with insecure communication
    • Lamport, L.: Password authentification with insecure communication. Commun. ACM 24(11), 770-772 (1981)
    • (1981) Commun ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 9
    • 0037377597 scopus 로고    scopus 로고
    • SCADA and IP: Is network convergence really here?
    • McClanahan, R.: SCADA and IP: is network convergence really here? IEEE Industry Applications Magazine 9(2), 29-36 (2003)
    • (2003) IEEE Industry Applications Magazine , vol.9 , Issue.2 , pp. 29-36
    • McClanahan, R.1
  • 10
    • 56749175324 scopus 로고    scopus 로고
    • Key management and secure software updates in wireless process control environments
    • Gligor, V.D., Hubaux, J.-P., Poovendran, R. (eds.). ACM, New York
    • Nilsson, D.K., Roosta, T., Lindqvist, U., Valdes, A.: Key management and secure software updates in wireless process control environments. In: Gligor, V.D., Hubaux, J.-P., Poovendran, R. (eds.)WISEC, pp. 100-108. ACM, New York (2008)
    • (2008) WISEC , pp. 100-108
    • Nilsson, D.K.1    Roosta, T.2    Lindqvist, U.3    Valdes, A.4
  • 14
    • 34249727108 scopus 로고    scopus 로고
    • The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection
    • DOI 10.1016/j.istr.2007.02.003, PII S1363412707000052
    • Roman, R., Alcaraz, C., Lopez, J.: The role of wireless sensor networks in the area of critical information infrastructure protection. Information Security Technical Report 12(1), 24-31 (2007) (Pubitemid 46829995)
    • (2007) Information Security Technical Report , vol.12 , Issue.1 , pp. 24-31
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3
  • 15
    • 49949100301 scopus 로고    scopus 로고
    • NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
    • Verdone, R. (ed.). Springer, Heidelberg
    • Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
    • (2008) EWSN 2008. LNCS , vol.4913 , pp. 305-320
    • Szczechowiak, P.1    Oliveira, L.B.2    Scott, M.3    Collier, M.4    Dahab, R.5
  • 17
    • 35348910049 scopus 로고    scopus 로고
    • Security in distributed, grid, and pervasive computing
    • Xiao, Y. (ed.), ch. 17. Auerbach Publications, CRC Press
    • Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Security in Distributed, Grid, and Pervasive Computing. In: Xiao, Y. (ed.) Wireless sensor network security: A survey, ch. 17. Auerbach Publications, CRC Press (2006)
    • (2006) Wireless Sensor Network Security: A Survey
    • Walters, J.P.1    Liang, Z.2    Shi, W.3    Chaudhary, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.