메뉴 건너뛰기




Volumn 1, Issue 2, 2005, Pages 204-239

Improving Key Predistribution with Deployment Knowledge in Static Sensor Networks

Author keywords

Algorithms; Design; key management; key predistribution; Security; Sensor networks

Indexed keywords


EID: 84866860550     PISSN: 15504859     EISSN: 15504867     Source Type: Journal    
DOI: 10.1145/1105688.1105691     Document Type: Article
Times cited : (155)

References (44)
  • 4
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • Lecture Notes in Computer Science, Springer Verlag, New York
    • Blom, R. 1985. An optimal class of symmetric key generation systems. In Advances in Cryptology: Proceedings of EUROCRYPT 84. Lecture Notes in Computer Science, Vol. 209. Springer Verlag, New York, 335-338
    • (1985) Advances in Cryptology: Proceedings of EUROCRYPT 84 , vol.209 , pp. 335-338
    • Blom, R.1
  • 6
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks)
    • New York, ACM International Symposium on Mobile Ad Hoc Networking and Computing
    • Buchegger, S. and Boudec, J. L. 2002. Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks). In Proceedings of the 3rd ACM, New York, ACM International Symposium on Mobile Ad Hoc Networking and Computing. 226-236
    • (2002) Proceedings of the 3rd ACM , pp. 226-236
    • Buchegger, S.1    Boudec, J.L.2
  • 7
    • 4544365398 scopus 로고    scopus 로고
    • Constrains and approaches for distributed sensor network security
    • NAI Labs
    • Carman, D., Krs, P., and Matt B. J. 2000. Constrains and approaches for distributed sensor network security. Tech. rep., NAI Labs
    • (2000) Tech. rep.
    • Carman, D.1    Krs, P.2    Matt, B.J.3
  • 15
    • 0022793132 scopus 로고
    • How to construct random functions
    • (Oct.)
    • Goldreich, O., Goldwasser, S., and Micali, S. 1986. How to construct random functions. J ACM 33, 4 (Oct.), 792-807
    • (1986) J ACM , vol.33 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 19
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • IEEE Computer Society Press, Los Alamitos, CA
    • Hu, Y., Perrig, A., and Johnson, D. 2003. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM2003. IEEE Computer Society Press, Los Alamitos, CA
    • (2003) Proceedings of INFOCOM2003
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 29
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • (Feb.), 41-77
    • Liu, D., Ning, P., and Li, R. 2005d. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Sys. Sec. 8, 1 (Feb.), 41-77
    • (2005) ACM Trans. Inf. Sys. Sec. , vol.8 , pp. 1
    • Liu, D.1    Ning, P.2    Li, R.3
  • 32
    • 0035684931 scopus 로고    scopus 로고
    • Ad hoc positioning system (APS)
    • IEEE Computer Society Press, Los Alamitos, CA
    • Niculescu, D. and Nath, B. 2001. Ad hoc positioning system (APS). In Proceedings of IEEE GLOBECOM'01. IEEE Computer Society Press, Los Alamitos, CA
    • (2001) Proceedings of IEEE GLOBECOM'01
    • Niculescu, D.1    Nath, B.2
  • 41
    • 2642534140 scopus 로고    scopus 로고
    • Efficient and mutually authenticated key exchange for low power computing devices
    • Wong, D. and Chan, A. 2001. Efficient and mutually authenticated key exchange for low power computing devices. In Proceedings of ASIA CRYPT
    • (2001) Proceedings of ASIA CRYPT
    • Wong, D.1    Chan, A.2
  • 42
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensornetworks
    • Wood, A. D. and Stankovic, J. A. 2002. Denial of service in sensornetworks. IEEE Compute 35, 10, 54-62
    • (2002) IEEE Compute , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 44
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
    • IEEE Computer Society Press, Los Alamitos, CA
    • Zhu, S., Setia, S., Jajodia, S., and Ning, P. 2004. An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In Proceedings of2004 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA
    • (2004) Proceedings of2004 IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.