메뉴 건너뛰기




Volumn 10, Issue 4, 2011, Pages

LARK: A lightweight authenticated rekeying scheme for clustered wireless sensor networks

Author keywords

Authentication; Key management; Lightweight security; Sensor networks

Indexed keywords

BACKWARD-AND-FORWARD SECURITY; CLUSTERED WIRELESS SENSOR NETWORKS; COMMUNICATION OVERHEADS; COMPLEX PROBLEMS; GROUP COMMUNICATIONS; GROUP MODELS; GROUP REKEYING; KEY CHAIN; KEY MANAGEMENT; LIGHTWEIGHT SECURITY; PHYSICAL WORLD; RE-KEYING; STORAGE OVERHEAD; WIRELESS MEDIUM;

EID: 82455192596     PISSN: 15399087     EISSN: 15583465     Source Type: Journal    
DOI: 10.1145/2043662.2043665     Document Type: Article
Times cited : (34)

References (68)
  • 1
    • 5444275208 scopus 로고    scopus 로고
    • Wireless sensor and actor network: Research challenges
    • AKYILDIZ, I. F. AND KASIMOGLU, I. H. 2004. Wireless sensor and actor network: Research challenges. Ad Hoc Netw. 2, 4, 351-367.
    • (2004) Ad Hoc Netw. , vol.2 , Issue.4 , pp. 351-367
    • Akyildiz, I.F.1    Kasimoglu, I.H.2
  • 5
    • 67650535901 scopus 로고    scopus 로고
    • Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
    • ĆARDENAS, A. A., ROOSTA, T., AND SASTRY, S. 2009. Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems. Ad Hoc Netw. 7, 8, 1434-1447.
    • (2009) Ad Hoc Netw. , vol.7 , Issue.8 , pp. 1434-1447
    • Ćardenas, A.A.1    Roosta, T.2    Sastry, S.3
  • 8
    • 77954770221 scopus 로고    scopus 로고
    • CHIPCON
    • CHIPCON. 2004. CC2420 Datasheet. http://www.chipcon.com/files/CC2420- Data-Sheet-1-3.pdf.
    • (2004) CC2420 Datasheet
  • 12
    • 30744442351 scopus 로고    scopus 로고
    • The RUNES middleware: A reconfigurable component-based approach to networked embedded systems
    • 1651554, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2005
    • COSTA, P., COULSON, G., MASCOLO, C., PICCO, G. P., AND ZACHARIADIS, S. 2005. The RUNES Middleware: A reconfigurable component-based approach to networked embedded systems. In Proceedings of the 16th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'05). Vol. 2, IEEE, 806-810. (Pubitemid 46530466)
    • (2005) IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC , vol.2 , pp. 806-810
    • Costa, P.1    Coulson, G.2    Mascolo, C.3    Picco, G.P.4    Zachariadis, S.5
  • 16
    • 77955768767 scopus 로고    scopus 로고
    • A security architecture for reconfigurable networked embedded systems
    • DINI, G. AND SAVINO, I. M. 2010. A security architecture for reconfigurable networked embedded systems. Int. J. Wirel. Inf. Netw. 17, 1, 11-25.
    • (2010) Int. J. Wirel. Inf. Netw. , vol.17 , Issue.1 , pp. 11-25
    • Dini, G.1    Savino, I.M.2
  • 21
    • 21844433206 scopus 로고    scopus 로고
    • Group key management scheme for large-scale sensor networks
    • DOI 10.1016/j.adhoc.2004.08.012, PII S1570870504000733, Data Communication and Topology Control in Ad Hoc Networks
    • ELTOWEISSY, M., WADAA, A., OLARIU, S., AND WILSON, L. 2005. Group key management for large-scale sensor networks. Ad-Hoc Netw. 3, 5, 668-688. (Pubitemid 40952630)
    • (2005) Ad Hoc Networks , vol.3 , Issue.5 , pp. 668-688
    • Eltoweissy, M.1    Wadaa, A.2    Olariu, S.3    Wilson, L.4
  • 22
    • 33646918277 scopus 로고    scopus 로고
    • Dynamic key management in sensor networks
    • DOI 10.1109/MCOM.2006.1632659
    • ELTOWEISSY, M., MOHARRUN, M., AND MUKKALA, R. 2006. Dynamic key management in sensor networks. IEEE Comm. Mag. 44, 4, 122-130. (Pubitemid 43792678)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 122-130
    • Eltoweissy, M.1    Moharrum, M.2    Mukkamala, R.3
  • 27
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • LAMPORT, L. 1981. Password authentication with insecure communication. Comm. ACM 24, 11, 770-772.
    • (1981) Comm ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 28
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • DOI 10.1145/1138127.1138130
    • LAW, Y. W., DOUMEN, J., AND HARTEL, P. 2006. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sensor Netw. 2, 1, 65-93. (Pubitemid 43925113)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.1 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 32
    • 46549088074 scopus 로고    scopus 로고
    • Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange
    • MISIĆ, J. 2008. Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange. Comput. Netw. 52, 11, 2227-2236.
    • (2008) Comput. Netw. , vol.52 , Issue.11 , pp. 2227-2236
    • Misić, J.1
  • 33
    • 84876668998 scopus 로고    scopus 로고
    • MOTEIV
    • MOTEIV. 2011. Tmote sky. http://www.moteiv.com/.
    • (2011) Tmote Sky
  • 36
    • 0009504774 scopus 로고
    • NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY National Institute of Standards and Technology
    • NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. 1995. FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology.
    • (1995) FIPS PUB 180-1: Secure Hash Standard
  • 37
    • 0347124644 scopus 로고    scopus 로고
    • NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY National Institute of Standards and Technology
    • NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. 1998. SKIPJACK and KEA Algorithm Specifications. National Institute of Standards and Technology.
    • (1998) SKIPJACK and KEA Algorithm Specifications
  • 39
    • 35348814206 scopus 로고    scopus 로고
    • NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY National Institute of Standards and Technology
    • NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. 2005. Plan for New Cryptographic Hash Functions. National Institute of Standards and Technology.
    • (2005) Plan for New Cryptographic Hash Functions
  • 40
    • 85016596484 scopus 로고    scopus 로고
    • LiSP: A lightweight security protocol for wireless sensor networks
    • PARK, T. AND SHIN, K. 2004. LiSP: A lightweight security protocol for wireless sensor networks. ACM Trans. Embed. Comput. Syst. 3, 3, 634-660.
    • (2004) ACM Trans. Embed. Comput. Syst. , vol.3 , Issue.3 , pp. 634-660
    • Park, T.1    Shin, K.2
  • 45
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • RAFAELI, S. AND HUTCHISON, D. 2003. A survey of key management for secure group communication. ACM Comput. Surv. 35, 3, 309-329.
    • (2003) ACM Comput. Surv. , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 47
    • 0030126124 scopus 로고    scopus 로고
    • Distributing trust with the rampart toolkit
    • REITER, M. K. 1996a. Distributing trust with the rampart toolkit. Comm. ACM 39, 4, 71-74. (Pubitemid 126428119)
    • (1996) Communications of the ACM , vol.39 , Issue.4 , pp. 71-74
    • Reiter, M.K.1
  • 49
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • Internet Engineering Task Force
    • RIVEST, R. 1992. The MD5 message-digest algorithm. Internet Request for Comment RFC 1321, Internet Engineering Task Force.
    • (1992) Internet Request for Comment RFC 1321
    • Rivest, R.1
  • 50
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • RIVEST, R., SHAMIR, A., AND ADLEMAN, L. 1978. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2, 120.
    • (1978) Comm ACM , vol.21 , Issue.2 , pp. 120
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 52
    • 33749041485 scopus 로고    scopus 로고
    • Applying intrusion detection systems to wireless sensor networks
    • DOI 10.1109/CCNC.2006.1593102, 1593102, 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006
    • ROMAN, R., ZHOU, J., AND LOPEZ, J. 2006. Applying intrusion detection systems to wireless sensor networks. In Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC'06). IEEE, 640-644. (Pubitemid 44460463)
    • (2006) 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006 , vol.1 , pp. 640-644
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 53
    • 35348832896 scopus 로고    scopus 로고
    • A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
    • DOI 10.1007/s11036-007-0024-2, Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing. Guest Editors: Maire O'Neill, Xinmiao Zhang, Nicolas Sklavos
    • ROMAN, R., ALCARAZ, C., AND LOPEZ, J. 2007. A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes. Mobile Netw. Appl. 12, 4, 231-244. (Pubitemid 47574435)
    • (2007) Mobile Networks and Applications , vol.12 , Issue.4 , pp. 231-244
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3
  • 54
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • SHERMAN, A. T. AND MCGREW, D. A. 2003. Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Engin. 29, 5, 444-458.
    • (2003) IEEE Trans. Softw. Engin. , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 55
    • 3543065166 scopus 로고    scopus 로고
    • Distributed control applications within sensor networks
    • SINOPOLI, B., SHARP, C., SCHENATO, L., SCHAFFERT, S., AND SASTRY, S. S. 2003. Distributed control applications within sensor networks. Proc. IEEE 91, 8, 1235-1246.
    • (2003) Proc. IEEE , vol.91 , Issue.8 , pp. 1235-1246
    • Sinopoli, B.1    Sharp, C.2    Schenato, L.3    Schaffert, S.4    Sastry, S.S.5
  • 60
    • 38549140749 scopus 로고    scopus 로고
    • Group rekeying schemes for secure group communication in wireless sensor networks
    • DOI 10.1109/ICC.2007.566, 4289237, 2007 IEEE International Conference on Communications, ICC'07
    • WANG, Y. AND RAMAMURTHY, B. 2007. Group rekeying schemes for secure group communication in wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC'07). IEEE, 3419-3424. (Pubitemid 351146061)
    • (2007) IEEE International Conference on Communications , pp. 3419-3424
    • Wang, Y.1    Ramamurthy, B.2
  • 61
    • 42649126015 scopus 로고    scopus 로고
    • Intrusion detection in homogeneous and heterogeneous wireless sensor networks
    • WANG, Y., WANG, X., XIE, B., WANG, D., AND AGRAWAL, D. P. 2008. Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans. Mobile Comput. 7, 6, 698-711.
    • (2008) IEEE Trans. Mobile Comput. , vol.7 , Issue.6 , pp. 698-711
    • Wang, Y.1    Wang, X.2    Xie, B.3    Wang, D.4    Agrawal, D.P.5
  • 62
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • DOI 10.1109/90.836475
    • WONG, C. K., GOUDA, M., AND LAM, S. S. 2000. Secure group communications using key graphs. IEEE/ACM Trans. Network. 8, 1, 16-30. (Pubitemid 30584705)
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 63
    • 33646921841 scopus 로고    scopus 로고
    • Location-aware combinatorial key management scheme for clustered sensor networks
    • DOI 10.1109/TPDS.2006.106
    • YOUNIS, M., GHUMMAN, K., AND ELTOWEISSY, M. 2006a. Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Trans. Parall. Distrib. Syst. 17, 8, 865-882. (Pubitemid 44070154)
    • (2006) IEEE Transactions on Parallel and Distributed Systems , vol.17 , Issue.8 , pp. 865-882
    • Younis, M.F.1    Ghumman, K.2    Eltoweissy, M.3
  • 65
    • 33745069352 scopus 로고    scopus 로고
    • Node clustering in wireless sensor networks: Recent developments and deployment challenges
    • DOI 10.1109/MNET.2006.1637928
    • YOUNIS, O., KRUNZ, M., AND RAMASUBRAMANIAN, S. 2006b. Node clustering in wireless sensor networks: Recent developments and deployment challenges. IEEE Netw. 20, 3, 20-25. (Pubitemid 43885283)
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 20-25
    • Younis, O.1    Krunz, M.2    Ramasubramanian, S.3
  • 66
    • 41549167232 scopus 로고    scopus 로고
    • A framework for identifying compromised nodes in wireless sensor networks
    • ZHANG, Q., YU, T., AND NING, P. 2008. A framework for identifying compromised nodes in wireless sensor networks. ACM Trans. Inf. Syst. Secur. 11, 3, 1-37.
    • (2008) ACM Trans. Inf. Syst. Secur. , vol.11 , Issue.3 , pp. 1-37
    • Zhang, Q.1    Y, U.T.2    Ning, P.3
  • 68
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • DOI 10.1145/1218556.1218559
    • ZHU, S., SETIA, S., AND JAJODIA, S. 2006. LEAP+: Efficient security mechanims for large-scale distributed sensor networks. ACM Trans. Sensor Netw. 2, 4, 500-528. (Pubitemid 46278640)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.