메뉴 건너뛰기




Volumn , Issue , 2011, Pages 312-316

A novel secure key management module for hierarchical clustering wireless sensor networks

Author keywords

cluster heads; hierarchical clustering; key calculation; secure key management module; sensor network security; super cluster head

Indexed keywords

CLUSTER HEAD; HIERARCHICAL CLUSTERING; KEY ESTABLISHMENTS; KEY MANAGEMENT; NODE CAPTURE ATTACK; RESOURCE LIMITATIONS; SECURE KEY MANAGEMENT; SECURITY GOALS; SECURITY MODULES; SECURITY SERVICES;

EID: 83155192019     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIMSim.2011.63     Document Type: Conference Paper
Times cited : (14)

References (23)
  • 2
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney,"A key management scheme for wireless sensor networks using deployment knowledge," IEEE InfoCom 2004.
    • IEEE InfoCom 2004
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 3
    • 32844459414 scopus 로고    scopus 로고
    • A key predistribution scheme for sensor networks using deployment knowledge
    • DOI 10.1109/TDSC.2006.2
    • W. Du, J. Deng, Y.S. Han, P.K. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Transactions on Dependable and Secure Computing, Vol. 3, Issue 1, pp.62-77, 2006. (Pubitemid 43254254)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.1 , pp. 62-77
    • Du, W.1    Deng, J.2    Han, Y.S.3
  • 6
    • 33750023217 scopus 로고    scopus 로고
    • An effective key management scheme for heterogeneous sensor networks
    • DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
    • Du X, Xiao Y, M Guizani and Chen H.H, "Effective key management for sensor networks,an effective key management scheme for heterogeneous sensor networks", Ad Hoc Networks, Volume 5, Issue 1, pp. 24-34, January 2007. (Pubitemid 44573000)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 24-34
    • Du, X.1    Xiao, Y.2    Guizani, M.3    Chen, H.-H.4
  • 8
    • 80053001439 scopus 로고    scopus 로고
    • Threat models and security issues in wireless sensor networks
    • Kuala Lumpur, Malaysia
    • Idrees S. Kocher, Chee-Onn Chow, Hiroshi Ishii and Tanveer A Zia, "Threat models and security issues in wireless sensor networks, ''In proceeding of (ICINC 2010),Vol.1, pp. 384-389, Kuala Lumpur, Malaysia.
    • Proceeding of (ICINC 2010) , vol.1 , pp. 384-389
    • Kocher, I.S.1    Chow, C.-O.2    Ishii, H.3    Zia, T.A.4
  • 9
    • 52049119700 scopus 로고    scopus 로고
    • Securing Wireless Sensor Networks: Security Architectures
    • D. Boyle and Thomas Newe," Securing Wireless Sensor Networks: security Architectures" (2008), Journal of Networks, VOL. 3, NO. 1,pp. 65-77.
    • (2008) Journal of Networks , vol.3 , Issue.1 , pp. 65-77
    • Boyle, D.1    Newe, T.2
  • 11
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • Zhu S., Setia S. and Jajodia S., "LEAP: EfficientSecurity mechanisms for large-scale distributed sensor networks," CCS '03, Washington D.C., USA, 27-31 October 2003, New York, USA: ACM Press, 62-72. (Pubitemid 40673789)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 12
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • Zhu S., Setia S. and Jajodia S.,"LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions on Sensor Networks TOSN,Vol.2,No.4,pp. 500-528.
    • ACM Transactions on Sensor Networks TOSN , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 17
    • 67650657363 scopus 로고    scopus 로고
    • Censor Networks: A critique of "sensor networks" from a systems perspective
    • July
    • B. Raman and K.Chebrolu, "Censor Networks: A critique of "sensor networks" from a systems perspective', ACM SIGCOMM Computer Communication Review, Vol. 38, No. 3, July 2008.
    • (2008) ACM SIGCOMM Computer Communication Review , vol.38 , Issue.3
    • Raman, B.1    Chebrolu, K.2
  • 20
    • 80052385335 scopus 로고    scopus 로고
    • Complete security framework for wireless sensor networks
    • K. Sharma, M.K. Ghose and Kuldeep,"Complete security framework for wireless sensor networks. IJCSIS, Vol.3,No.1,2009.
    • (2009) IJCSIS , vol.3 , Issue.1
    • Sharma, K.1    Ghose, M.K.2    Kuldeep3
  • 21
    • 80052999781 scopus 로고    scopus 로고
    • Cross layer security framework for wireless sensor networks
    • K. Sharma and G. MK,"Cross layer security framework for wireless sensor networks," IJSA,Vol. 5,No.1,pp.39-52.,2011.
    • (2011) IJSA , vol.5 , Issue.1 , pp. 39-52
    • Sharma, K.1    MK, G.2
  • 22
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks", ACM CCS,2003.
    • (2003) ACM CCS
    • Liu, D.1    Ning, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.