메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

The novel authentication scheme based on theory of quadratic residues for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION SCHEME; COMMUNICATION CAPABILITIES; CRYPTOGRAPHIC PRIMITIVES; INTERNET OF THINGS (IOT); KEY MANAGEMENT SCHEMES; LOW ENERGY CONSUMPTION; QUADRATIC RESIDUES; SECURITY OF WIRELESS SENSOR NETWORKS;

EID: 84877268810     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2013/829048     Document Type: Article
Times cited : (6)

References (31)
  • 3
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • 2-s2.0-46449122114 10.1016/j.comnet.2008.04.002
    • Yick J., Mukherjee B., Ghosal D., Wireless sensor network survey. Computer Networks 2008 52 12 2292 2330 2-s2.0-46449122114 10.1016/j.comnet.2008. 04.002
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 5
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • 2-s2.0-4243082091 10.1145/990680.990707
    • Perrig A., Stankovic J., Wagner D., Security in wireless sensor networks. Communications of the ACM 2004 47 6 53 57 2-s2.0-4243082091 10.1145/990680.990707
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 6
    • 49749084392 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • 2-s2.0-49749084392 10.1109/MWC.2008.4599222
    • Du X., Chen H. H., Security in wireless sensor networks. IEEE Wireless Communications 2008 15 4 60 66 2-s2.0-49749084392 10.1109/MWC.2008.4599222
    • (2008) IEEE Wireless Communications , vol.15 , Issue.4 , pp. 60-66
    • Du, X.1    Chen, H.H.2
  • 8
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • 2-s2.0-0036738266 10.1023/A:1016598314198
    • Perrig A., Szewczyk R., Tygar J. D., Wen V., Culler D. E., SPINS: security protocols for sensor networks. Wireless Networks 2002 8 5 521 534 2-s2.0-0036738266 10.1023/A:1016598314198
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 9
    • 69949155644 scopus 로고    scopus 로고
    • An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
    • 2-s2.0-69949155644
    • Li C. T., Hwang M. S., Chu Y. P., An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks. International Journal of Innovative Computing, Information and Control 2009 5 8 2107 2124 2-s2.0-69949155644
    • (2009) International Journal of Innovative Computing, Information and Control , vol.5 , Issue.8 , pp. 2107-2124
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 10
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • 2-s2.0-46749099079 10.1016/j.comcom.2007.12.005
    • Li C. T., Hwang M. S., Chu Y. P., A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications 2008 31 12 2803 2814 2-s2.0-46749099079 10.1016/j.comcom.2007.12.005
    • (2008) Computer Communications , vol.31 , Issue.12 , pp. 2803-2814
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 11
    • 84858252750 scopus 로고    scopus 로고
    • Improving identity-based random key establishment scheme for large-scale hierarchical wireless sensor networks
    • Das A. K., Improving identity-based random key establishment scheme for large-scale hierarchical wireless sensor networks. International Journal of Network Security 2012 14 1 1 21
    • (2012) International Journal of Network Security , vol.14 , Issue.1 , pp. 1-21
    • Das, A.K.1
  • 12
    • 69949134676 scopus 로고    scopus 로고
    • Authenticated reliable and semi-reliable communication in wireless sensor networks
    • Dressler F., Authenticated reliable and semi-reliable communication in wireless sensor networks. International Journal of Network Security 2008 7 1 61 68
    • (2008) International Journal of Network Security , vol.7 , Issue.1 , pp. 61-68
    • Dressler, F.1
  • 14
    • 76549106506 scopus 로고    scopus 로고
    • Vulnerabilities and attacks in wireless sensor networks
    • Lansdale, Pa, USA IOS Press Cryptology & Information Security Series (CIS)
    • Benenson Z., Cholewinski P. M., Freiling F. C., Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security 2008 Lansdale, Pa, USA IOS Press 22 43 Cryptology & Information Security Series (CIS)
    • (2008) Wireless Sensors Networks Security , pp. 22-43
    • Benenson, Z.1    Cholewinski, P.M.2    Freiling, F.C.3
  • 17
    • 34248339107 scopus 로고    scopus 로고
    • Modeling adaptive node capture attacks in multi-hop wireless networks
    • DOI 10.1016/j.adhoc.2007.01.002, PII S1570870507000133, Wireless Mesh Networks
    • Tague P., Poovendran R., Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Networks 2007 5 6 801 814 2-s2.0-34248339107 10.1016/j.adhoc.2007.01.002 (Pubitemid 46729710)
    • (2007) Ad Hoc Networks , vol.5 , Issue.6 , pp. 801-814
    • Tague, P.1    Poovendran, R.2
  • 19
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • DOI 10.1109/MC.2002.1039518
    • Wood A. D., Stankovic J. A., Denial of service in sensor networks. Computer 2002 35 10 54 62 2-s2.0-0036793924 10.1109/MC.2002.1039518 (Pubitemid 35186161)
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 20
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • 2-s2.0-38349154579 10.1109/MPRV.2008.6
    • Raymond D. R., Midkiff S. F., Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Computing 2008 7 1 74 81 2-s2.0-38349154579 10.1109/MPRV.2008.6
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 21
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Washington, DC, USA
    • Bellardo J., Savage S., 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. Proceedings of USENIX Security Symposium 2003 Washington, DC, USA 15 28
    • (2003) Proceedings of USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 22
    • 33947309586 scopus 로고    scopus 로고
    • Analysis of area-congestion-based DDoS attacks in ad hoc networks
    • DOI 10.1016/j.adhoc.2006.04.002, PII S1570870506000229
    • Gu Q., Liu P., Chu C. H., Analysis of area-congestion-based DDoS attacks in ad hoc networks. Ad Hoc Networks 2007 5 5 613 625 2-s2.0-33947309586 10.1016/j.adhoc.2006.04.002 (Pubitemid 46437457)
    • (2007) Ad Hoc Networks , vol.5 , Issue.5 , pp. 613-625
    • Gu, Q.1    Liu, P.2    Chu, C.-H.3
  • 27
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • 2-s2.0-46749130059 10.1016/j.comnet.2008.04.016
    • Chen Y., Chou J. S., Sun H. M., A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks 2008 52 12 2373 2380 2-s2.0-46749130059 10.1016/j.comnet.2008.04.016
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2373-2380
    • Chen, Y.1    Chou, J.S.2    Sun, H.M.3
  • 28
    • 78751649779 scopus 로고    scopus 로고
    • Improvement of the RFID authentication scheme based on quadratic residues
    • 2-s2.0-78751649779 10.1016/j.comcom.2010.05.011
    • Yeh T. C., Wu C. H., Tseng Y. M., Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 2011 34 3 337 341 2-s2.0-78751649779 10.1016/j.comcom.2010.05.011
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 337-341
    • Yeh, T.C.1    Wu, C.H.2    Tseng, Y.M.3
  • 31
    • 79952574261 scopus 로고    scopus 로고
    • A light-weight authentication scheme for wireless sensor networks
    • 2-s2.0-79952574261 10.1016/j.adhoc.2010.08.020
    • Delgado-Mohatar O., Fúster-Sabater A., Sierra J. M., A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks 2011 9 5 727 735 2-s2.0-79952574261 10.1016/j.adhoc.2010.08.020
    • (2011) Ad Hoc Networks , vol.9 , Issue.5 , pp. 727-735
    • Delgado-Mohatar, O.1    Fúster-Sabater, A.2    Sierra, J.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.