메뉴 건너뛰기




Volumn 23, Issue 5, 2012, Pages 958-965

The three-tier security scheme in wireless sensor networks with mobile sinks

Author keywords

Distributed; security; wireless sensor networks.

Indexed keywords

ACCESS NODE; AUTHENTICATION MECHANISMS; DATA ACCUMULATION; DATA COLLECTION; KEY PREDISTRIBUTION SCHEME; MOBILE SINKS; PAIR-WISE KEYS; SECURITY CHALLENGES; SECURITY FRAMEWORKS; SECURITY SCHEME;

EID: 84859722160     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2010.185     Document Type: Article
Times cited : (84)

References (22)
  • 1
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
    • I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002. (Pubitemid 34181630)
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubramaniam, Y.3    Cayirci, E.4
  • 6
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • DOI 10.1109/MCOM.2002.1039859
    • H. Deng, W. Li, and D.P. Agrawal, "Routing Security in Wireless Ad Hoc Networks," Proc. IEEE Comm. Magazine, pp. 70-75, 2002. (Pubitemid 35311948)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 14
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • D. Liu, P. Ning, and R.Li. Establishing, "Pairwise Keys in Distributed Sensor Networks," Proc. 10th ACM Conf. Computers and Comm. Security (CCS '03), pp. 52-61, Oct. 2003. (Pubitemid 40673788)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 15
    • 27644517087 scopus 로고    scopus 로고
    • Key distribution techniques for sensor networks
    • Kluwer Academic
    • H. Chan, A. Perrig, and D. Song, "Key Distribution Techniques for Sensor Networks," Wireless Sensor Networks, pp. 277-303, Kluwer Academic, 2004.
    • (2004) Wireless Sensor Networks , pp. 277-303
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 17
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," Proc. 10th ACM Conf. Computers and Comm. Security (CCS '03), pp. 62-72, Oct. 2003. (Pubitemid 40673789)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 18
    • 62849114245 scopus 로고    scopus 로고
    • An efficient key distribution scheme for establishing pairwise keys with a mobile sink in distributed sensor networks
    • Dec
    • A. Rasheed and R. Mahapatra, "An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks," Proc. IEEE 27th Int'l Performance Computing and Comm. Conf. (IPCCC '08), pp. 264-270, Dec. 2008.
    • (2008) Proc IEEE 27th Int'l Performance Computing and Comm. Conf. (IPCCC '08) , pp. 264-270
    • Rasheed, A.1    Mahapatra, R.2
  • 20
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, vol, 24, no. 11, pp. 770-772, Nov. 1981.
    • (1981) Comm ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 22
    • 0003195066 scopus 로고
    • The md5 message-digest algorithm
    • Apr
    • R. Rivest, "The MD5 Message-Digest Algorithm," RFC 1321, Apr. 1992.
    • (1992) RFC , vol.1321
    • Rivest, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.