메뉴 건너뛰기




Volumn 7, Issue 3, 2012, Pages 127-136

A security routing protocol based on public key matrix for wireless sensor networks

Author keywords

Asymmetric cryptographic algorithm; Communication overhead; Security protocol; Symmetric cryptographic algorithm; Wireless sensor networks

Indexed keywords

AUTHENTICATION SERVERS; COMMUNICATION OVERHEAD; COMMUNICATION OVERHEADS; CRYPTOGRAPHIC ALGORITHMS; LARGE-SCALE WIRELESS SENSOR NETWORKS; NETWORK NODE; PRIVATE KEY; PUBLIC KEYS; RESOURCE CONSTRAINT; SECRET INFORMATION; SECURITY PROTOCOLS; SECURITY ROUTING PROTOCOL; THIRD PARTIES; WIRELESS SENSOR NETWORK (WSN);

EID: 84863268780     PISSN: 19759320     EISSN: 22339299     Source Type: Journal    
DOI: 10.4156/jcit.vol7.issue3.15     Document Type: Article
Times cited : (2)

References (33)
  • 1
    • 46449122114 scopus 로고    scopus 로고
    • Wireless Sensor Network Survey
    • J. Yick, B. Mukherjee and D. Ghosal, "Wireless Sensor Network Survey", Computer Networks, Vol. 52, No. 4, pp. 2292-2330, 2008.
    • (2008) Computer Networks , vol.52 , Issue.4 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 2
    • 79960408014 scopus 로고    scopus 로고
    • Secure Real-Time Routing Protocol With Load Distribution in Wireless Sensor Networks
    • A. A. Ahmed, N. F. Fisal, "Secure Real-Time Routing Protocol With Load Distribution in Wireless Sensor Networks", Security and Communication Networks, Vol. 4, No. 8, pp. 839-869, 2011.
    • (2011) Security and Communication Networks , vol.4 , Issue.8 , pp. 839-869
    • Ahmed, A.A.1    Fisal, N.F.2
  • 3
    • 79955095625 scopus 로고    scopus 로고
    • Performance Comparison of Routing Protocols in Wireless Sensor Networks
    • G. Geetika, Prachi and S. Mittal, "Performance Comparison of Routing Protocols in Wireless Sensor Networks", Communications in Computer and Information Science, Vol. 147, Part 3, pp. 379-383, 2011.
    • (2011) Communications in Computer and Information Science , vol.147 , Issue.PART 3 , pp. 379-383
    • Geetika, G.1    Prachi2    Mittal, S.3
  • 4
    • 79955822096 scopus 로고    scopus 로고
    • A Small World Routing Protocol in Wireless Sensor Networks
    • W. Xu, L. Sun, J. Guo, R. Wang, "A Small World Routing Protocol in Wireless Sensor Networks", Key Engineering Material, Vol. 474~476, pp. 828-833, 2011.
    • (2011) Key Engineering Material , vol.474 , pp. 828-833
    • Xu, W.1    Sun, L.2    Guo, J.3    Wang, R.4
  • 5
    • 79961067078 scopus 로고    scopus 로고
    • An Efficient Permutation Routing Protocol in Multi-Hop Wireless Sensor Networks
    • H. Lakhlef, A. B. Bomgni, J. F. Myoupo, An Efficient Permutation Routing Protocol in Multi-Hop Wireless Sensor Networks, IJACT, Vol. 3, No. 6, pp. 207-214, 2011.
    • (2011) IJACT , vol.3 , Issue.6 , pp. 207-214
    • Lakhlef, H.1    Bomgni, A.B.2    Myoupo, J.F.3
  • 6
    • 79953708582 scopus 로고    scopus 로고
    • An Multi-hop Cluster Based Routing Protocol for Wireless Sensor Networks
    • Q. Yang, Y. Zhuang, H. Li, An Multi-hop Cluster Based Routing Protocol for Wireless Sensor Networks, JCIT, Vol. 6, No. 3, pp. 318-325, 2011.
    • (2011) JCIT , vol.6 , Issue.3 , pp. 318-325
    • Yang, Q.1    Zhuang, Y.2    Li, H.3
  • 7
    • 85035363269 scopus 로고    scopus 로고
    • Adaptive Protocols for Information Dissemination in Wireless Sensor Networks
    • Seattle, WA
    • W. R. Heinzelman, J. Kulik, and H. Balakrishnan, "Adaptive Protocols for Information Dissemination in Wireless Sensor Networks", In Proceedings ACM MobiCom '99, Seattle, WA, 1999.
    • Proceedings ACM MobiCom '99 , pp. 1999
    • Heinzelman, W.R.1    Kulik, J.2    Balakrishnan, H.3
  • 8
    • 84986959281 scopus 로고
    • A Survey of Gossiping and Broadcasting in Communication Networks
    • S. M. Hedetniemi, S. H. Hedetniemi, and A. Liestman, "A Survey of Gossiping and Broadcasting in Communication Networks", Networks, Vol. 18, No. 4, pp. 319-349, 1988.
    • (1988) Networks , vol.18 , Issue.4 , pp. 319-349
    • Hedetniemi, S.M.1    Hedetniemi, S.H.2    Liestman, A.3
  • 9
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security Protocols for Sensors Networks
    • A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E Culler
    • A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E Culler, "SPINS: Security Protocols for Sensors Networks", ACM Wireless Network, Vol. 8, No. 5, pp. 521-534, 2002.
    • (2002) ACM Wireless Network , vol.8 , Issue.5 , pp. 521-534
  • 10
    • 84872952464 scopus 로고    scopus 로고
    • On Wireless Sensor Networks: Architectures, Protocols, Applications, and Management
    • Sydney, Australia
    • Y. Al-Obaisat, R. Braun. "On Wireless Sensor Networks: Architectures, Protocols, Applications, and Management", In Proceedings of the Auswireless Conference, Sydney, Australia, 2006.
    • Proceedings of the Auswireless Conference , pp. 2006
    • Al-Obaisat, Y.1    Braun, R.2
  • 12
    • 30344482882 scopus 로고    scopus 로고
    • INSENS: Intrusion-tolerant routing in wireless sensor networks
    • J. Deng, R. Han, and S. Mishra, "INSENS: intrusion-tolerant routing in wireless sensor networks", Computer Communications, Vol. 29, No. 2, pp. 26-43, 2006.
    • (2006) Computer Communications , vol.29 , Issue.2 , pp. 26-43
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 18
    • 51949089156 scopus 로고    scopus 로고
    • PEGASIS: Power-Efficient Gathering in Sensor Information System
    • New York: IEEE Press
    • S. Lindsey, C. Raghavendra, "PEGASIS: Power-Efficient Gathering in Sensor Information System", Proceeding of IEEE Aerospace Conference. New York: IEEE Press, pp. 1125-1130, 2002.
    • (2002) Proceeding of IEEE Aerospace Conference , pp. 1125-1130
    • Lindsey, S.1    Raghavendra, C.2
  • 19
    • 13944259745 scopus 로고    scopus 로고
    • SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks
    • X. Y. Wang, L. Z. Yang, K. F. Chen, "SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks", Wuhan University Journal of Natural Sciences, Vol. 10, No. 1, pp. 127-131, 2005.
    • (2005) Wuhan University Journal of Natural Sciences , vol.10 , Issue.1 , pp. 127-131
    • Wang, X.Y.1    Yang, L.Z.2    Chen, K.F.3
  • 20
    • 58049106676 scopus 로고    scopus 로고
    • A Secure Routing Protocol for Cluster-based Wireless Sensor Networks Using Group Key Management, 4th International Conference on Wireless Communications, Networking and Mobile Computing
    • K. Zhang, C. Wang and C. Wang, "A Secure Routing Protocol for Cluster-based Wireless Sensor Networks Using Group Key Management", 4th International Conference on Wireless Communications, Networking and Mobile Computing, WICOM'08, pp. 1-5, 2008.
    • (2008) WICOM'08 , pp. 1-5
    • Zhang, K.1    Wang, C.2    Wang, C.3
  • 24
    • 0035505507 scopus 로고    scopus 로고
    • Routing with Guaranteed Delivery in Ad-Hoc Wireless Networks
    • P. Bose, P. Morin
    • P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, "Routing with Guaranteed Delivery in Ad-Hoc Wireless Networks", ACM Wireless Networks, Vol. 7, No. 6, pp. 609-616, 2001.
    • (2001) ACM Wireless Networks , vol.7 , Issue.6 , pp. 609-616
    • Bose, P.1    Morin, P.2    Stojmenovic, I.3    Urrutia, J.4
  • 31
    • 0141473270 scopus 로고    scopus 로고
    • Fast Variants of RSA
    • D. Boneh, H. Shacham, "Fast Variants of RSA", CryptoBytes, Vol. 5, No. 1, pp. 1-9, 2002.
    • (2002) CryptoBytes , vol.5 , Issue.1 , pp. 1-9
    • Boneh, D.1    Shacham, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.