메뉴 건너뛰기




Volumn , Issue , 2012, Pages

A distributed approach for secure M2M communications

Author keywords

AVISPA; energy efficiency; formal security analysis; key establishment; M2M; resource constraints

Indexed keywords

AVISPA; FORMAL SECURITY ANALYSIS; KEY ESTABLISHMENTS; M2M; RESOURCE CONSTRAINT;

EID: 84863918899     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NTMS.2012.6208702     Document Type: Conference Paper
Times cited : (15)

References (20)
  • 2
    • 27644517087 scopus 로고    scopus 로고
    • Key Distribution Techniques for Sensor Networks
    • T. Znati et al., eds.
    • H. Chan, A. Perrig and D. Song,"Key Distribution Techniques for Sensor Networks," Wireless Sensor Networks, T. Znati et al., eds., 2004.
    • (2004) Wireless Sensor Networks
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 8
    • 53149137371 scopus 로고    scopus 로고
    • Hardware - Software implementation of public-key cryptography for wireless sensor networks
    • June
    • G. Murphy, A. Keeshan, R. Agarwal, and E. Popovici, "Hardware - software implementation of public-key cryptography for wireless sensor networks," in IET Irish Signals and Systems Conference, pp. 463-468, June 2006.
    • (2006) IET Irish Signals and Systems Conference , pp. 463-468
    • Murphy, G.1    Keeshan, A.2    Agarwal, R.3    Popovici, E.4
  • 9
    • 56949106654 scopus 로고    scopus 로고
    • A unified security framework with three key management schemes for wireless sensor networks
    • R. Riaz, A. Naureen, A. Akram, A. Akbar, K. Kim, and H. Farooq Ahmed, "A unified security framework with three key management schemes for wireless sensor networks," Computer Communications, vol. 31, no. 18, pp. 4269-4280, 2008.
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4269-4280
    • Riaz, R.1    Naureen, A.2    Akram, A.3    Akbar, A.4    Kim, K.5    Farooq Ahmed, H.6
  • 14
    • 33846984345 scopus 로고    scopus 로고
    • available at
    • B. Sklar. Reed-solomon codes, available at http://ptgmedia.pearsoncmg. com/images/art-sklar7-reed-solomon/elementLinks/art-sklar7-reed-solomon.pdf
    • Reed-solomon Codes
    • Sklar, B.1
  • 16
    • 26444497860 scopus 로고    scopus 로고
    • The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
    • Etessami, K., Rajamani, S.K. (eds.) CAV 2005. Springer, Heidelberg
    • A. Armando et al, "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications," in Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, Springer, Heidelberg (2005), http://www.avispa-project.org
    • (2005) LNCS , vol.3576
    • Armando, A.1
  • 18
    • 84876097386 scopus 로고    scopus 로고
    • SPAN - A Security Protocol ANimator for AVISPA - User Manual
    • Y. Glouche and T. Genet. "SPAN - a Security Protocol ANimator for AVISPA - User Manual," IRISA / Université de Rennes 1, 2006. 20 pages. http ://www.irisa.fr/lande/genet/span/.
    • (2006) IRISA / Université de Rennes , vol.1 , pp. 20
    • Glouche, Y.1    Genet, T.2
  • 20
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • N.R. Potlapally, S. Ravi, A. Raghunathan and N.K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing (2006), pp. 128-143.
    • (2006) IEEE Transactions on Mobile Computing , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.