메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

A secret sharing-based key management in hierarchical wireless sensor network

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION MECHANISMS; CLUSTERED ARCHITECTURES; HIERARCHICAL ARCHITECTURES; HIERARCHICAL WIRELESS SENSOR NETWORKS; NETWORK COMMUNICATIONS; SECURITY ANALYSIS; VULNERABLE ENVIRONMENTS; WIRELESS SENSOR NETWORK (WSNS);

EID: 84879384267     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2013/406061     Document Type: Article
Times cited : (23)

References (18)
  • 4
    • 33750023217 scopus 로고    scopus 로고
    • An effective key management scheme for heterogeneous sensor networks
    • 2-s2.0-33750023217 10.1016/j.adhoc.2006.05.012
    • Du X., Xiao Y., Guizani M., Chen H. H., An effective key management scheme for heterogeneous sensor networks. Ad Hoc Networks 2007 5 1 24 34 2-s2.0-33750023217 10.1016/j.adhoc.2006.05.012
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 24-34
    • Du, X.1    Xiao, Y.2    Guizani, M.3    Chen, H.H.4
  • 6
    • 42649115167 scopus 로고    scopus 로고
    • Securing wireless sensor networks against aggregator compromises
    • 2-s2.0-42649115167 10.1109/MCOM.2008.4481352
    • Claveirole T., Dias De Amorim M., Abdalla M., Viniotis Y., Securing wireless sensor networks against aggregator compromises. IEEE Communications Magazine 2008 46 4 134 141 2-s2.0-42649115167 10.1109/MCOM.2008.4481352
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 134-141
    • Claveirole, T.1    Dias De Amorim, M.2    Abdalla, M.3    Viniotis, Y.4
  • 9
    • 84881144842 scopus 로고    scopus 로고
    • A real-time dynamic key management for hierarchical wireless multimedia sensor network
    • 2-s2.0-84857964060 10.1007/s11042-012-1054-8
    • Zhang Y. Y., Li X. Z., Yang J. C., Liu Y. A., Xiong N. X., Vasilakos A. V., A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimedia Tools and Applications 2012 2-s2.0-84857964060 10.1007/s11042-012-1054-8
    • (2012) Multimedia Tools and Applications
    • Zhang, Y.Y.1    Li, X.Z.2    Yang, J.C.3    Liu, Y.A.4    Xiong, N.X.5    Vasilakos, A.V.6
  • 12
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • 2-s2.0-33847120377 10.1145/1218556.1218559
    • Zhu S., Setia S., Jajodia S., LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2006 2 4 500 528 2-s2.0-33847120377 10.1145/1218556.1218559
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 13
    • 33646918277 scopus 로고    scopus 로고
    • Dynamic key management in sensor networks
    • 2-s2.0-33646918277 10.1109/MCOM.2006.1632659
    • Eltoweissy M., Moharrum M., Mukkamala R., Dynamic key management in sensor networks. IEEE Communications Magazine 2006 44 4 122 130 2-s2.0-33646918277 10.1109/MCOM.2006.1632659
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 122-130
    • Eltoweissy, M.1    Moharrum, M.2    Mukkamala, R.3
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • 2-s2.0-0018545449 10.1145/359168.359176
    • Shamir A., How to share a secret. Communications of the ACM 1979 22 11 612 613 2-s2.0-0018545449 10.1145/359168.359176
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 84865050539 scopus 로고    scopus 로고
    • Verifiable secret sharing in a total of three rounds
    • Agrawal S., Verifiable secret sharing in a total of three rounds. Information Processing Letters 2012 112 856 859
    • (2012) Information Processing Letters , vol.112 , pp. 856-859
    • Agrawal, S.1
  • 17
    • 84862010429 scopus 로고    scopus 로고
    • Verifiable multi-secret sharing based on LFSR sequences
    • Hua C., Liao X., Cheng X., Verifiable multi-secret sharing based on LFSR sequences. Theoretical Computer Science 2012 445 52 62
    • (2012) Theoretical Computer Science , vol.445 , pp. 52-62
    • Hua, C.1    Liao, X.2    Cheng, X.3
  • 18
    • 84862832565 scopus 로고    scopus 로고
    • Efficient (n, t, n) secret sharing schemes
    • 2-s2.0-84859553604 10.1016/j.jss.2012.01.027
    • Liu Y.-X., Harn L., Yang C.-N., Zhang Y.-Q., Efficient (n, t, n) secret sharing schemes. Journal of Systems and Software 2012 85 6 1325 1332 2-s2.0-84859553604 10.1016/j.jss.2012.01.027
    • (2012) Journal of Systems and Software , vol.85 , Issue.6 , pp. 1325-1332
    • Liu, Y.-X.1    Harn, L.2    Yang, C.-N.3    Zhang, Y.-Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.