메뉴 건너뛰기




Volumn 7, Issue 2, 2012, Pages 107-121

Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks

Author keywords

Heterogeneous network architecture; Intrusion prevention; PKC; Public key cryptography; Secret key cryptography; User authentication; Wireless sensor networks; WSNs

Indexed keywords

AUTHENTICATION; ENERGY EFFICIENCY; HETEROGENEOUS NETWORKS; NETWORK ARCHITECTURE; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84868231183     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2012.050027     Document Type: Article
Times cited : (18)

References (28)
  • 1
    • 0028272762 scopus 로고
    • Privacy and authentication for wireless local area networks
    • Aziz, A. and Diffie, W. (1994) 'Privacy and authentication for wireless local area networks', IEEE Personal Communications Magazine, Vol. 1, No. 1, pp.25-31.
    • (1994) IEEE Personal Communications Magazine , vol.1 , Issue.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 5
    • 79957925553 scopus 로고    scopus 로고
    • Advanced two tier user authentication scheme for heterogeneous wireless sensor networks
    • 9-12 January, Las Vegas, Nevada, USA
    • Butun, I. and Sankar, R. (2011) 'Advanced two tier user authentication scheme for heterogeneous wireless sensor networks', Proceedings of the Consumer Communications and Networking Conference (CCNC), 9-12 January, Las Vegas, Nevada, USA, pp.169-171.
    • (2011) Proceedings of the Consumer Communications and Networking Conference (CCNC) , pp. 169-171
    • Butun, I.1    Sankar, R.2
  • 7
    • 35448965082 scopus 로고    scopus 로고
    • Two tier secure routing protocol for heterogeneous sensor networks
    • DOI 10.1109/TWC.2007.06095
    • Du, X., Mohsen, G., Yang, X.O. and Hsiao-Hwa, C. (2007) 'Two tier secure routing protocol for heterogeneous sensor networks', IEEE Transactions on Wireless Communications, Vol. 6, No. 9, pp.3395-3401. (Pubitemid 47625218)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.9 , pp. 3395-3401
    • Du, X.1    Guizani, M.2    Xiao, Y.3    Chen, H.-H.4
  • 10
    • 23944459661 scopus 로고    scopus 로고
    • Public key cryptography in sensor networks-revisited
    • Security in Ad-hoc and Sensor Networks - First European Workshop, ESAS 2004
    • Gaubatz, G., Kaps, J.P. and Sunar, B. (2005b) 'Public key cryptography in sensor networks-revisited', Springer Journal of Security in Ad-hoc and Sensor Networks, Vol. 3313, pp.2-18. (Pubitemid 41190913)
    • (2005) Lecture Notes in Computer Science , vol.3313 , pp. 2-18
    • Gaubatz, G.1    Kaps, J.-P.2    Sunar, B.3
  • 13
    • 84868242584 scopus 로고    scopus 로고
    • An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
    • Le, X.H., Lee, S., Butun, I., Khalid, M. and Sankar, R. (2009a) 'An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography', Journal of Communications and Networks, Vol. 5, No. 3, pp.240-247.
    • (2009) Journal of Communications and Networks , vol.5 , Issue.3 , pp. 240-247
    • Le, X.H.1    Lee, S.2    Butun, I.3    Khalid, M.4    Sankar, R.5
  • 17
    • 34748850632 scopus 로고    scopus 로고
    • Implementation of elliptic-curve cryptography on mobile healthcare devices
    • DOI 10.1109/ICNSC.2007.372784, 4238997, 2007 IEEE International Conference on Networking, Sensing and Control, ICNSC'07
    • Malhotra, K., Gardner, S. and Patz, R. (2007) 'Implementation of elliptic curve cryptography on mobile healthcare devices', Proceedings of the IEEE International Conference on Networking, Sensing and Control, 15-17 April, London, UK, pp.239-244. (Pubitemid 47468796)
    • (2007) 2007 IEEE International Conference on Networking, Sensing and Control, ICNSC'07 , pp. 239-244
    • Malhotra, K.1    Gardner, S.2    Patz, R.3
  • 19
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • DOI 10.1109/TMC.2006.16
    • Potlapally, N.R., Ravi, S., Raghunathan, A. and Jha, N.K. (2006) 'A study of the energy consumption characteristics of cryptographic algorithms and security protocols', IEEE Transactions on Mobile Computing, Vol. 5, No. 2, pp.128-143. (Pubitemid 43671073)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 21
    • 84855203308 scopus 로고    scopus 로고
    • Computational and energy costs of cryptographic algorithms on handheld devices
    • Rifa-Pous, H. and Herrera-Joancomarti, J. (2011) 'Computational and energy costs of cryptographic algorithms on handheld devices', Journal of Future Internet, Vol. 3, No. 1, pp.31-48.
    • (2011) Journal of Future Internet , vol.3 , Issue.1 , pp. 31-48
    • Rifa-Pous, H.1    Herrera-Joancomarti, J.2
  • 24
    • 39349093196 scopus 로고    scopus 로고
    • An improved dynamic user authentication scheme for wireless sensor networks
    • DOI 10.1109/GLOCOM.2007.190, 4411100, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
    • Tseng, H.R., Jan, R.H. and Yang, W. (2007) 'An improved dynamic user authentication scheme for wireless sensor networks', Proceedings of IEEE Global Communications Conference, (GLOBECOM), 26-30 November, Washington, DC, USA, pp.986-990. (Pubitemid 351259178)
    • (2007) GLOBECOM - IEEE Global Telecommunications Conference , pp. 986-990
    • Tseng, H.-R.1    Jan, R.-H.2    Yang, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.