메뉴 건너뛰기




Volumn 11, Issue 6, 2012, Pages 2106-2115

PKC based broadcast authentication using signature amortization for WSNs

Author keywords

Broadcast authentication; signature amortization; wireless sensor networks

Indexed keywords

BROADCAST AUTHENTICATION; BROADCAST MESSAGES; ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM; LOW OVERHEAD; PUBLIC KEY DISTRIBUTION; RESOURCE-CONSTRAINED; SIGNATURE AMORTIZATION; TIME SYNCHRONIZATION; WIRELESS SENSOR NETWORK (WSNS);

EID: 84862848192     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2012.032812.110433     Document Type: Article
Times cited : (57)

References (32)
  • 3
    • 22744432612 scopus 로고    scopus 로고
    • The dynamic behavior of a data dissemination protocol for network programming at scale
    • J. W. Hui and D. Culler, "The dynamic behavior of a data dissemination protocol for network programming at scale," in Proc. 2004 ACM SenSys, pp. 81-94.
    • Proc. 2004 ACM SenSys , pp. 81-94
    • Hui, J.W.1    Culler, D.2
  • 6
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 8
    • 85000276942 scopus 로고    scopus 로고
    • Multilevel "TESLA: Broadcast authentication for distributed sensor networks
    • ACM
    • D. Liu and P. Ning, "Multilevel "TESLA: Broadcast authentication for distributed sensor networks," ACM Trans. Embeded Computing Syst., vol. 3, no. 4, pp. 800-836, 2004.
    • (2004) Trans. Embeded Computing Syst. , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 9
    • 50949090446 scopus 로고    scopus 로고
    • BABRA: Batch-based broadcast authentication in wireless sensor networks
    • Y. Zhou and Y. Fang, "BABRA: Batch-based broadcast authentication in wireless sensor networks," in Proc. 2006 IEEE GLOBECOM, pp. 1-5.
    • Proc. 2006 IEEE GLOBECOM , pp. 1-5
    • Zhou, Y.1    Fang, Y.2
  • 10
    • 41849094781 scopus 로고    scopus 로고
    • Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    • P. Ning, A. Liu, and W. Du, "Mitigating DoS attacks against broadcast authentication in wireless sensor networks," ACM Trans. Sensor Networking, vol. 4, no. 1, pp. 1-35, 2008.
    • (2008) ACM Trans. Sensor Networking , vol.4 , Issue.1 , pp. 1-35
    • Ning, P.1    Liu, A.2    Du, W.3
  • 11
    • 77954163084 scopus 로고    scopus 로고
    • Secure and efficient broadcast authentication in wireless sensor networks
    • T. Kwon and J. Hong, "Secure and efficient broadcast authentication in wireless sensor networks," IEEE Trans. Computers, vol. 59, no. 8, pp. 1120-1133, 2010.
    • (2010) IEEE Trans. Computers , vol.59 , Issue.8 , pp. 1120-1133
    • Kwon, T.1    Hong, J.2
  • 12
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • K. Ren, W. Lou, K. Zeng, and P. Moran, "On broadcast authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136-4144, 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.11 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.4
  • 13
    • 51249105540 scopus 로고    scopus 로고
    • Defending DoS attacks on broadcast authentication in wireless sensor networks
    • X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "Defending DoS attacks on broadcast authentication in wireless sensor networks," in Proc. 2008 IEEE ICC, pp. 1653-1657.
    • Proc. 2008 IEEE ICC , pp. 1653-1657
    • Du, X.1    Guizani, M.2    Xiao, Y.3    Chen, H.-H.4
  • 15
    • 0032594123 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • C. K. Wong and S. Lam, "Digital signatures for flows and multicasts," IEEE/ACM Trans. Networking, vol. 7, no. 4, pp. 502-513, 1999.
    • (1999) IEEE/ ACM Trans. Networking , vol.7 , Issue.4 , pp. 502-513
    • Wong, C.K.1    Lam, S.2
  • 20
    • 35448965082 scopus 로고    scopus 로고
    • Two tier secure routing protocol for heterogeneous sensor networks
    • X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "Two tier secure routing protocol for heterogeneous sensor networks," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3395-3401, 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.9 , pp. 3395-3401
    • Du, X.1    Guizani, M.2    Xiao, Y.3    Chen, H.-H.4
  • 21
    • 62949194452 scopus 로고    scopus 로고
    • A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks
    • -, "A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1223-1229, 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1223-1229
    • Du, X.1
  • 23
    • 77949415724 scopus 로고    scopus 로고
    • Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
    • K. M. Finnigin, B. E. Mullins, R. A. Raines, and H. B. Potoczny, "Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks," Int"l J. Security and Networks, vol. 2, no. 3, pp. 260-271, 2007.
    • (2007) Int"l J. Security and Networks , vol.2 , Issue.3 , pp. 260-271
    • Finnigin, K.M.1    Mullins, B.E.2    Raines, R.A.3    Potoczny, H.B.4
  • 25
    • 70350234578 scopus 로고    scopus 로고
    • A survey of anonymity in wireless communication systems
    • H. Chen, Y. Xiao, X. Hong, F. Hu, and J. L. Xie, "A survey of anonymity in wireless communication systems," Security and Commun. Networks, vol. 2, no. 5, pp. 427-444, 2009.
    • (2009) Security and Commun. Networks , vol.2 , Issue.5 , pp. 427-444
    • Chen, H.1    Xiao, Y.2    Hong, X.3    Hu, F.4    Xie, J.L.5
  • 26
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Commun., vol. 30, no. 11, pp. 2314-2341, 2007.
    • (2007) Computer Commun. , vol.30 , Issue.11 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 27
    • 79551621944 scopus 로고    scopus 로고
    • A distributed public key caching scheme in large wireless networks
    • Y. Kong, J. Deng, and S. Tate, "A distributed public key caching scheme in large wireless networks," in Proc. 2010 IEEE GLOBECOM, pp. 1-5.
    • Proc. 2010 IEEE GLOBECOM , pp. 1-5
    • Kong, Y.1    Deng, J.2    Tate, S.3
  • 30
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in Proc. 2008 IEEE IPSN, pp. 245-256.
    • Proc. 2008 IEEE IPSN , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 32
    • 70349668850 scopus 로고    scopus 로고
    • Lightweight remote image management for secure code dissemination in wireless sensor networks
    • A. Liu, P. Ning, and C. Wang, "Lightweight remote image management for secure code dissemination in wireless sensor networks," in Proc. 2009 IEEE INFOCOM, pp. 1242-1250.
    • Proc. 2009 IEEE Infocom , pp. 1242-1250
    • Liu, A.1    Ning, P.2    Wang, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.