메뉴 건너뛰기




Volumn 55, Issue 4, 2012, Pages 384-396

Secure-TWS: Authenticating node to multi-user communication in shared sensor networks

Author keywords

authentication; cryptography; digital signatures; security; wireless sensor networks

Indexed keywords

APPLICATION LAYER PROTOCOLS; COMMUNICATION PATTERN; DESIGN SPACES; EFFICIENT AUTHENTICATION; ELLIPTIC CURVE; ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM; LOW POWER; MULTIPLE APPLICATIONS; MULTIPLE USER; MULTIUSER COMMUNICATION; RESOURCE-CONSTRAINED; SCHNORR SIGNATURE; SECURITY; SECURITY SOLUTIONS; SECURITY SUPPORT; SENSOR NODE ARCHITECTURE; SHORT SIGNATURES; SIGNATURE SCHEME; WIRELESS SENSOR NETWORK (WSN);

EID: 84859306176     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxr089     Document Type: Article
Times cited : (11)

References (56)
  • 1
    • 36248949044 scopus 로고    scopus 로고
    • SenseWeb: An infrastructure for shared sensing
    • Kansal, A., Nath, S., Liu, J. and Zhao, F. (2007) SenseWeb: An infrastructure for shared sensing. IEEE MultiMedia, 14, 8-13.
    • (2007) IEEE MultiMedia , vol.14 , pp. 8-13
    • Kansal, A.1    Nath, S.2    Liu, J.3    Zhao, F.4
  • 6
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boneh, D., Lynn, B. and Shacham, H. (2004) Short signatures from the Weil pairing. J. Cryptol., 17, 297-319.
    • (2004) J. Cryptol. , vol.17 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 7
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its applications
    • In Bao, F., Deng, R.H. and Zhou, J. (eds), Lecture Notes in Computer Science 2947 Springer
    • Zhang, F., Safavi-Naini, R. and Susilo, W. (2004) An Efficient Signature Scheme from Bilinear Pairings and its Applications. In Bao, F., Deng, R.H. and Zhou, J. (eds), Public Key Cryptography (PKC 2004), Lecture Notes in Computer Science 2947, pp. 277-290. Springer.
    • (2004) Public Key Cryptography (PKC 2004 , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3
  • 8
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • Also in MobiCom'01
    • Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J.D. (2002) SPINS: Security protocols for sensor networks. Wirel. Netw., 8, 521-534. Also in MobiCom'01.
    • (2002) Wirel. Netw. , vol.8 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Wen, V.3    Culler, D.4    Tygar, J.D.5
  • 9
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • NewYork, NY, USA, October, ACM Press
    • Zhu, S., Setia, S. and Jajodia, S. (2003) LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. 10th ACM Conf. Computer and Communication Security (CCS'03), NewYork, NY, USA, October, pp. 62-72. ACM Press.
    • (2003) 10th ACM Conf. Computer and Communication Security (CCS'03 , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 10
    • 33645091897 scopus 로고    scopus 로고
    • Sizzle: A standardsbased end-to-end security architecture for the embedded internet
    • Also appeared in PERCOM'05
    • Gupta, V., Wurm, M., Zhu, Y., Millard, M., Fung, S., Gura, N., Eberle, H. and Chang Shantz, S. (2005) Sizzle: A standardsbased end-to-end security architecture for the embedded internet. Pervasive Mob. Comput., 1, 425-445. Also appeared in PERCOM'05.
    • (2005) Pervasive Mob. Comput. , vol.1 , pp. 425-445
    • Gupta, V.1    Wurm, M.2    Zhu, Y.3    Millard, M.4    Fung, S.5    Gura, N.6    Eberle, H.7    Chang Shantz, S.8
  • 11
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • In Blakley, G. and Chaum, D. (eds), Santa Barbara, CA, USA, August, Springer
    • Shamir, A. (1984) Identity-Based Cryptosystems and Signature Schemes. In Blakley, G. and Chaum, D. (eds),CRYPTO'84, Santa Barbara, CA, USA, August, pp. 47-53. Springer.
    • (1984) CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 12
    • 53149126145 scopus 로고    scopus 로고
    • TinyPBC: Pairings for authenticated identity-based noninteractive key distribution in sensor networks
    • Kanazawa/Japan
    • Oliveira, L.B., Scott, M., López, J. and Dahab, R. (2008) TinyPBC: Pairings for Authenticated Identity-Based Noninteractive Key Distribution in Sensor Networks. 5th Int. Conf. Networked Sensing Systems (INSS'08), Kanazawa/Japan, pp. 173-180.
    • (2008) 5th Int. Conf. Networked Sensing Systems (INSS'08 , pp. 173-180
    • Oliveira, L.B.1    Scott, M.2    López, J.3    Dahab, R.4
  • 14
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • Washington, DC, USA, IEEE Computer Society
    • Liu, A. and Ning, P. (2008) TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. IPSN '08: Proc. 7th Int. Conf. Information Processing in Sensor Networks,Washington, DC, USA, pp. 245-256. IEEE Computer Society.
    • (2008) IPSN '08: Proc. 7th Int. Conf. Information Processing in Sensor Networks , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 16
    • 38149009170 scopus 로고    scopus 로고
    • Short signatures without random oracles and the SDH assumption in bilinear groups
    • Boneh, D. and Boyen, X. (2008) Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol., 21, 149-177.
    • (2008) J. Cryptol. , vol.21 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 17
    • 33646820668 scopus 로고    scopus 로고
    • Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
    • In Roy, B.K. (ed.), Chennai, December, Springer
    • Barreto, P., Libert, B., Mccullagh, N. and Quisquater, J.-J. (2005) Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In Roy, B.K. (ed.), Advances in Cryptology-ASIACRYPT 2005, Chennai, December, pp. 515-532. Springer.
    • (2005) Advances in Cryptology-ASIACRYPT , vol.2005 , pp. 515-532
    • Barreto, P.1    Libert, B.2    Mccullagh, N.3    Quisquater, J.-J.4
  • 19
    • 0036870095 scopus 로고    scopus 로고
    • Mica: A wireless platform for deeply embedded networks
    • Hill, J.L. and Culler, D.E. (2002) Mica: A wireless platform for deeply embedded networks. IEEE Micro, 22, 12-24.
    • (2002) IEEE Micro , vol.22 , pp. 12-24
    • Hill, J.L.1    Culler, D.E.2
  • 21
    • 0002956095 scopus 로고
    • CM-Curves with Good Cryptographic Properties
    • Santa Barbara, CA, USA, August, Lecture Notes in Computer Science 576, Springer
    • Koblitz, N. (1991) CM-Curves with Good Cryptographic Properties. 11th Annual Int. Cryptology Conf. (CRYPTO 1991), Santa Barbara, CA, USA, August, Lecture Notes in Computer Science 576, pp. 279-287. Springer.
    • (1991) 11th Annual Int. Cryptology Conf. (CRYPTO 1991 , pp. 279-287
    • Koblitz, N.1
  • 22
    • 0010029876 scopus 로고    scopus 로고
    • Efficient arithmetic on Koblitz curves
    • Solinas, J.A. (2000) Efficient arithmetic on Koblitz curves. Des. Codes Cryptogr., 19, 195-249.
    • (2000) Des. Codes Cryptogr. , vol.19 , pp. 195-249
    • Solinas, J.A.1
  • 23
    • 79957797091 scopus 로고    scopus 로고
    • Faster point multiplication on elliptic curves with efficient endomorphisms
    • In Kilian, J. (ed.), Santa Barbara, CA, USA, August, Designs, Codes and Cryptography 2139, Springer
    • Gallant, R., Lambert, R. and Vanstone, S. (2001) Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. In Kilian, J. (ed.), 21st Annual Int. Cryptology Conf. (CRYPTO 2001), Santa Barbara, CA, USA, August, Designs, Codes and Cryptography 2139, pp. 190-200. Springer.
    • (2001) 21st Annual Int. Cryptology Conf. (CRYPTO 2001 , pp. 190-200
    • Gallant, R.1    Lambert, R.2    Vanstone, S.3
  • 25
    • 0021468777 scopus 로고
    • Fast evaluation of logarithms in fields of characteristic two
    • Coppersmith, D. (1984) Fast evaluation of logarithms in fields of characteristic two. IEEE Trans. Inf. Theory, 30, 587-593.
    • (1984) IEEE Trans. Inf. Theory , vol.30 , pp. 587-593
    • Coppersmith, D.1
  • 27
    • 33745604534 scopus 로고    scopus 로고
    • Pairing-friendly elliptic curves of prime order
    • In Preneel, B. and Tavares, S.E. (eds), Kingston, Canada, August, Lecture Notes in Computer Science 3897, Springer
    • Barreto, P.S.L.M. and Naehrig, M. (2005) Pairing-Friendly Elliptic Curves of Prime Order. In Preneel, B. and Tavares, S.E. (eds), 12th Int. Workshop on Selected Areas in Cryptography (SAC 2005), Kingston, Canada, August, Lecture Notes in Computer Science 3897, pp. 319-331. Springer.
    • (2005) 12th Int. Workshop on Selected Areas in Cryptography (SAC 2005 , pp. 319-331
    • Barreto, P.S.L.M.1    Naehrig, M.2
  • 30
    • 31344437951 scopus 로고    scopus 로고
    • Pairing-based cryptography at high security levels
    • In Smart, N.P. (ed.), Cirencester, UK, December, Lecture Notes in Computer Science 3796, Springer
    • Koblitz, N. and Menezes, A. (2005) Pairing-Based Cryptography at High Security Levels. In Smart, N.P. (ed.), IMA Int. Conf., Cirencester, UK, December, Lecture Notes in Computer Science 3796, pp. 13-36. Springer.
    • (2005) IMA Int. Conf. , pp. 13-36
    • Koblitz, N.1    Menezes, A.2
  • 32
    • 84955368946 scopus 로고
    • More flexible exponentiation with precomputation
    • In Desmedt, Y. (ed.), London, UK,August, Lecture Notes in Computer Science 839, Springer
    • Lim, C.H. and Lee, P.J. (1994) More Flexible Exponentiation with Precomputation. In Desmedt, Y. (ed.), 14th Annual Int. Cryptology Conf. (CRYPTO1994), London, UK,August, Lecture Notes in Computer Science 839, pp. 95-107. Springer.
    • (1994) 14th Annual Int. Cryptology Conf. (CRYPTO1994 , pp. 95-107
    • Lim, C.H.1    Lee, P.J.2
  • 33
    • 84968484435 scopus 로고
    • Speeding the pollard and elliptic curve methods of factorization
    • Montgomery, P. (1987) Speeding the pollard and elliptic curve methods of factorization. Math. Comput., 48, 243-264.
    • (1987) Math. Comput. , vol.48 , pp. 243-264
    • Montgomery, P.1
  • 34
    • 77953034949 scopus 로고    scopus 로고
    • Efficient implementation of elliptic curve cryptography in wireless sensors
    • Aranha, D.F., Oliveira, L.B., López, J. and Dahab, R. (2010) Efficient implementation of elliptic curve cryptography in wireless sensors. Adv Math. Commun., 4, 169-187.
    • (2010) Adv Math. Commun. , vol.4 , pp. 169-187
    • Aranha, D.F.1    Oliveira, L.B.2    López, J.3    Dahab, R.4
  • 36
    • 38549149186 scopus 로고    scopus 로고
    • Another look at square roots (and other less common operations) in fields of even characteristic
    • In Adams, C.M., Miri, A. andWiener, M.J. (eds), Berlin, Heidelberg, March, Springer
    • Avanzi, R.M. (2007) Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic. In Adams, C.M., Miri, A. andWiener, M.J. (eds), Selected Areas in Cryptography, Berlin, Heidelberg, March, pp. 138-154. Springer.
    • (2007) Selected Areas in Cryptography , pp. 138-154
    • Avanzi, R.M.1
  • 37
    • 49949089509 scopus 로고    scopus 로고
    • Optimizing multiprecision multiplication for public key cryptography
    • Report 2007/299.
    • Scott, M. and Szczechowiak, P. (2007). Optimizing Multiprecision Multiplication for Public Key Cryptography. Cryptology ePrint Archive, Report 2007/299. http://eprint.iacr.org/.
    • (2007) Cryptology Eprint Archive
    • Scott, M.1    Szczechowiak, P.2
  • 38
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • Montgomery, P.L. (1985) Modular multiplication without trial division. Math. Comput., 44, 519-521.
    • (1985) Math. Comput. , vol.44 , pp. 519-521
    • Montgomery, P.L.1
  • 39
    • 77649245119 scopus 로고    scopus 로고
    • Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller
    • In Roy, B.K. and Sendrier, N. (eds), New Delphi, India, December, Lecture Notes in Computer Science 5922, Springer
    • Gouvêa, C.P.L. and López, J. (2009) Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. In Roy, B.K. and Sendrier, N. (eds), INDOCRYPT, New Delphi, India, December, Lecture Notes in Computer Science 5922, pp. 248-262. Springer.
    • (2009) INDOCRYPT , pp. 248-262
    • Gouvêa, C.P.L.1    López, J.2
  • 41
    • 33745111889 scopus 로고    scopus 로고
    • Challenges: Building scalable mobile underwater wireless sensor networks for aquatic applications
    • Cui, J.-H., Kong, J., Gerla, M. and Zhou, S. (2006) Challenges: Building scalable mobile underwater wireless sensor networks for aquatic applications. IEEE Netw. Special Issue Wirel. Sensor Netw., 20, 12-18.
    • (2006) IEEE Netw. Special Issue Wirel. Sensor Netw. , vol.20 , pp. 12-18
    • Cui, J.-H.1    Kong, J.2    Gerla, M.3    Zhou, S.4
  • 42
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Warsaw, Poland, May, Springer
    • Boneh, D. and Gentry, C. (2003) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Proc. Eurocrypt 2003, Warsaw, Poland, May, pp. 416-432. Springer.
    • (2003) Proc. Eurocrypt , vol.2003 , pp. 416-432
    • Boneh, D.1    Gentry, C.2
  • 45
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Also in ACM CCS'03
    • Liu, D., Ning, P. and Li, R. (2005) Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8, 41-77. Also in ACM CCS'03.
    • (2005) ACM Trans. Inf. Syst. Secur. , vol.8 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 46
    • 23244467182 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks
    • Also in ACM CCS'03
    • Du,W., Deng, J., Han,Y.S., Varshney, P.K., Katz, J. and Khalili, A. (2005) A pairwise key pre-distribution scheme for wireless sensor networks. ACMTrans. Inf. Syst. Secur., 8, 228-58. Also in ACM CCS'03.
    • (2005) ACMTrans. Inf. Syst. Secur. , vol.8 , pp. 228-58
    • Du, W.1    Deng J., HanY.S.2    Varshney, P.K.3    Katz, J.4    Khalili, A.5
  • 47
    • 84943553152 scopus 로고    scopus 로고
    • Establishing pairwisekeys for secure communication inad hoc networks:A probabilistic approach
    • Atlanta, November,. IEEE
    • Zhu, S., Xu, S., Setia, S. and Jajodia, S. (2003) Establishing PairwiseKeys for Secure Communication inAd hoc Networks:A Probabilistic Approach. 11th IEEE Int. Conf. Network Protocols (ICNP'03), Atlanta, November, pp. 326-335. IEEE.
    • (2003) 11th IEEE Int. Conf. Network Protocols (ICNP'03 , pp. 326-335
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 49
    • 56749151138 scopus 로고    scopus 로고
    • Pre-authentication filters: Providing dos resistance for signature-based broadcast authentication in sensor networks
    • New York, NY, USA, March, ACM
    • Dong, Q., Liu, D. and Ning, P. (2008) Pre-authentication Filters: Providing Dos Resistance for Signature-Based Broadcast Authentication in Sensor Networks. WiSec'08: 1st ACM Conf. Wireless Network Security, New York, NY, USA, March, pp. 2-12. ACM.
    • (2008) WiSec'08: 1st ACM Conf. Wireless Network Security , pp. 2-12
    • Dong, Q.1    Liu, D.2    Ning, P.3
  • 50
    • 41849094781 scopus 로고    scopus 로고
    • MitigatingDoSattacks against broadcast authentication in wireless sensor networks
    • Ning, P., Liu,A. and Du,W. (2008) MitigatingDoSattacks against broadcast authentication in wireless sensor networks.ACMTrans. Sensor Netw., 4, 1-35.
    • (2008) ACMTrans. Sensor Netw. , vol.4 , pp. 1-35
    • Ning, P.1    Liu, A.2    Du, W.3
  • 53
    • 51849124994 scopus 로고    scopus 로고
    • Implementing public-key infrastructure for sensor networks
    • 23. Also in SECON'04
    • Malan, D.J., Welsh, M. and Smith, M.D. (2008) Implementing public-key infrastructure for sensor networks.ACMTrans. Sensor Netw., 4, 22:1-22:23. Also in SECON'04.
    • (2008) ACMTrans. Sensor Netw. , vol.4 , Issue.22 , pp. 1-22
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 55
    • 84947777892 scopus 로고    scopus 로고
    • High-speed software multiplication in GF(2m
    • In Bimal K. Roy, E.O. (ed.), London, UK, Lecture Notes in Computer Science, December, Springer
    • López, J. and Dahab, R. (2000) High-Speed Software Multiplication in GF(2m). In Bimal K. Roy, E.O. (ed.), Progress in Cryptology-INDOCRYPT'00, London, UK, Lecture Notes in Computer Science, December, pp. 203-212. Springer.
    • (2000) Progress in Cryptology-INDOCRYPT'00 , pp. 203-212
    • López, J.1    Dahab, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.