메뉴 건너뛰기




Volumn 14, Issue 1, 2012, Pages 1-21

Improving identity-based random key establishment scheme for large-scale hierarchical wireless sensor networks

Author keywords

Identity based key pre distribution; Key management; Large scale hierarchical networks; Wireless sensor network

Indexed keywords

COMMUNICATION OVERHEADS; COMPUTATIONAL OVERHEADS; IDENTITY-BASED; KEY ESTABLISHMENTS; KEY MANAGEMENT; KEY PRE-DISTRIBUTION; LARGE SCALE SENSOR NETWORK; LARGE-SCALE HIERARCHICAL NETWORKS; NEIGHBORING NODES; NETWORK CONNECTIVITY; PSEUDO-RANDOM FUNCTIONS; SECRET KEY; STORAGE OVERHEAD; TRADE OFF; WIRELESS SENSOR NETWORK (WSN);

EID: 84858252750     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (21)

References (39)
  • 3
    • 34247224664 scopus 로고    scopus 로고
    • Key distribution mechanisms for wireless sensor networks: a survey
    • TR-05-07, Rensselaer Polytechnic Institute, March
    • S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey", Technical Report, TR-05-07, Rensselaer Polytechnic Institute, March 2005.
    • (2005) Technical Report
    • Camtepe, S.A.1    Yener, B.2
  • 4
    • 84858227508 scopus 로고    scopus 로고
    • A survey on analytic studies of key distribution mechanisms in wireless sensor networks
    • A. K. Das, "A survey on analytic studies of key distribution mechanisms in wireless sensor networks", Journal of Information Assurance and Security, vol. 5, no. 5, pp. 526-553, 2010.
    • (2010) Journal of Information Assurance and Security , vol.5 , Issue.5 , pp. 526-553
    • Das, A.K.1
  • 7
    • 33750111807 scopus 로고    scopus 로고
    • An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
    • Y. Cheng and D.P. Agrawal, "An improved key distribution mechanism for large-scale hierarchical wireless sensor networks", Ad Hoc Networks, vol. 5, no. 1, pp. 35-48, 2007.
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 35-48
    • Cheng, Y.1    Agrawal, D.P.2
  • 8
    • 46749158359 scopus 로고    scopus 로고
    • An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks
    • March
    • A. K. Das, "An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks", International Journal of Network Security, vol. 6, no. 2, pp. 134-144, March 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.2 , pp. 134-144
    • Das, A.K.1
  • 9
    • 78651528527 scopus 로고    scopus 로고
    • A location-adaptive key establishment scheme for large-scale distributed wireless sensor networks
    • A. K. Das, "A location-adaptive key establishment scheme for large-scale distributed wireless sensor networks", Journal of Computers, vol. 4, no. 9, pp. 896-904, 2009.
    • (2009) Journal of Computers , vol.4 , Issue.9 , pp. 896-904
    • Das, A.K.1
  • 10
    • 79251556858 scopus 로고    scopus 로고
    • An effcient random key distribution scheme for large-scale distributed sensor networks
    • DOI:10.1002/sec.123, June
    • A. K. Das, "An effcient random key distribution scheme for large-scale distributed sensor networks", Security and Communication Networks, Published online in Wiley InterScience, DOI: 10.1002/sec.123, June 2009.
    • (2009) Security and Communication Networks, Published online in Wiley InterScience
    • Das, A.K.1
  • 16
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, vol. IT-31, no. 4, pp. 469-472, July 1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 19
    • 0022793132 scopus 로고    scopus 로고
    • How to construct random functions
    • Oct
    • O. Goldreich, S. Goldwasser and S. Micali, "How to construct random functions", Journal of the ACM, vol. 33, no. 4, pp. 792-807, Oct. 1986.
    • Journal of the ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 20
    • 0347227352 scopus 로고
    • Secure hash standard, FIPS PUB 180-1, U.S. Department of Commerce, April
    • Secure hash standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995.
    • (1995) National Institute of Standards and Technology (NIST)
  • 21
    • 84891576128 scopus 로고    scopus 로고
    • Crossbow Technology Inc.
    • Crossbow Technology Inc., Wireless Sensor networks, 2010. (http://www.xbow.com)
    • (2010) Wireless Sensor networks
  • 24
    • 0003237987 scopus 로고
    • The Kerberos Net-work Authentication Service (V5)
    • Sep
    • J. Kohl and B. Clifford Neuman, "The Kerberos Network Authentication Service (V5)", RFC 1510, Sep. 1993.
    • (1993) RFC 1510
    • Kohl, J.1    Clifford Neuman, B.2
  • 25
    • 84866860550 scopus 로고    scopus 로고
    • Improving key pre-distribution with deployment knowledge in static sensor networks
    • D. Liu and P. Ning, "Improving key pre-distribution with deployment knowledge in static sensor networks", ACM Transactions on Sensor Networks, vol. 1, no. 2, pp. 204-239, 2005.
    • (2005) ACM Transactions on Sensor Networks , vol.1 , Issue.2 , pp. 204-239
    • Liu, D.1    Ning, P.2
  • 30
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • 8-11 May
    • B. Parno, A. Perrig and V. Gligor, "Distributed detection of node replication attacks in sensor networks", IEEE Symposium on Security and Privacy, pp. 49-63, 8-11 May 2005.
    • IEEE Symposium on Security and Privacy , vol.2005 , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 31
    • 78249241072 scopus 로고    scopus 로고
    • Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
    • M. B. Paterson and D. R. Stinson, "Two attacks on a sensor network key distribution scheme of Cheng and Agrawal", Journal of Mathematical Cryptology, vol. 2, no. 4, pp. 393-403, 2008.
    • (2008) Journal of Mathematical Cryptology , vol.2 , Issue.4 , pp. 393-403
    • Paterson, M.B.1    Stinson, D.R.2
  • 33
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and publickey cryptosystems
    • Feb
    • R. L. Rivest, A. Shamir and L. M. Adleman, "A method for obtaining digital signatures and publickey cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 36
    • 14344260955 scopus 로고    scopus 로고
    • Robust key establishment in sensor networks
    • March
    • Y. Wang, "Robust key establishment in sensor networks", ACM SIGMOD Record, vol. 33, no. 1, pp. 14-19, March 2004.
    • (2004) ACM SIGMOD Record , vol.33 , Issue.1 , pp. 14-19
    • Wang, Y.1
  • 37
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu and M. Galloway, "A survey of key management schemes in wireless sensor networks", Computer Communications, vol. 30, no. 11-12, pp. 2314-2341, 2007.
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 38
    • 48049095381 scopus 로고    scopus 로고
    • Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks
    • August
    • Y. Zhang, D. Gu and J. Li, "Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks", Computer Communications, vol. 31, no. 13, pp. 2959-2971, August 2008.
    • (2008) Computer Communications , vol.31 , Issue.13 , pp. 2959-2971
    • Zhang, Y.1    Gu, D.2    Li, J.3
  • 39
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Effcient security mechanisms for large-scale distributed sensor networks
    • November
    • S. Zhu, S. Setia and S. Jajodia, "LEAP+: Effcient security mechanisms for large-scale distributed sensor networks", ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500-528, November 2006.
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.