메뉴 건너뛰기




Volumn 7, Issue 8, 2013, Pages 2042-2060

HRKT: A hierarchical route key tree based group key management for wireless sensor networks

Author keywords

Group key management; Network security; Route key tree; Wireless sensor networks

Indexed keywords

COMMUNICATION OVERHEADS; DESIGN CONSIDERATIONS; GROUP KEY MANAGEMENT; KEY TREE; PERFORMANCE SIMULATION; SECURE COMMUNICATIONS; TRANSMISSION SECURITY; WIRELESS SENSOR NETWORK (WSNS);

EID: 84883327674     PISSN: 19767277     EISSN: 22881468     Source Type: Journal    
DOI: 10.3837/tiis.2013.08.017     Document Type: Article
Times cited : (8)

References (26)
  • 2
    • 85027929506 scopus 로고    scopus 로고
    • Component-based localization in sparse wireless networks
    • Apr
    • X. Wang, J. Luo, Y. Liu, S. Li, and D. Dong, "Component-based localization in sparse wireless networks," IEEE/ACM Transactions on Networking, vol. 19, no. 2, pp. 540-548, Apr. 2011.
    • (2011) IEEE/ACM Transactions On Networking , vol.19 , Issue.2 , pp. 540-548
    • Wang, X.1    Luo, J.2    Liu, Y.3    Li, S.4    Dong, D.5
  • 3
    • 84863126291 scopus 로고    scopus 로고
    • Energy-Efficient Cooperative Spectrum Sensing by Optimal Scheduling in Sensor-Aided Cognitive Radio Networks
    • Feb
    • R. Deng, J. Chen, C. Yuen, P. Cheng, and Y. Sun, "Energy-Efficient Cooperative Spectrum Sensing by Optimal Scheduling in Sensor-Aided Cognitive Radio Networks," IEEE Transactions on Vehicular Technology, vol. 61, no.2, pp. 716-725, Feb. 2012.
    • (2012) IEEE Transactions On Vehicular Technology , vol.61 , Issue.2 , pp. 716-725
    • Deng, R.1    Chen, J.2    Yuen, C.3    Cheng, P.4    Sun, Y.5
  • 4
    • 84872043672 scopus 로고    scopus 로고
    • Energy-Efficient Cooperative Spectrum Sensing in Sensor-Aided Cognitive Radio Networks
    • Dec
    • P. Cheng, R. Deng, and J. Chen, "Energy-Efficient Cooperative Spectrum Sensing in Sensor-Aided Cognitive Radio Networks," IEEE Wireless Communications, vol.19,no.6, pp. 100-105, Dec. 2012.
    • (2012) IEEE Wireless Communications , vol.19 , Issue.6 , pp. 100-105
    • Cheng, P.1    Deng, R.2    Chen, J.3
  • 7
    • 84861478182 scopus 로고    scopus 로고
    • A NTRU Based Key Generation and Data Transmission Scheme for Sensor Networks
    • June
    • M. Wen, J. Li, Z. Yin, et al., "A NTRU Based Key Generation and Data Transmission Scheme for Sensor Networks," Journal of Computational Information Systems, vol. 8, no.6, pp. 2417-2424, June, 2012.
    • (2012) Journal of Computational Information Systems , vol.8 , Issue.6 , pp. 2417-2424
    • Wen, M.1    Li, J.2    Yin, Z.3
  • 8
    • 64249083197 scopus 로고    scopus 로고
    • A key management protocol with robust continuity for sensor networks
    • Apr
    • M. Wen, Y. Zheng, W. Ye, K. Chen, and W. Qiu, "A key management protocol with robust continuity for sensor networks," Computer Standards & Interfaces, vol. 31, no. 4, pp. 642-647, Apr. 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 642-647
    • Wen, M.1    Zheng, Y.2    Ye, W.3    Chen, K.4    Qiu, W.5
  • 10
    • 82555196697 scopus 로고    scopus 로고
    • BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
    • Jan
    • R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks," IEEE Trans. on Parallel and Distributed Systems, vol. 23, no. 1, pp. 32-43, Jan. 2012.
    • (2012) IEEE Trans. On Parallel and Distributed Systems , vol.23 , Issue.1 , pp. 32-43
    • Lu, R.1    Lin, X.2    Zhu, H.3    Liang, X.4    Shen, X.5
  • 11
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Sep
    • S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sep. 2003.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 13
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb
    • C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
    • (2000) IEEE/ACM Transactions On Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 17
    • 73349089638 scopus 로고    scopus 로고
    • Topological key hierarchy for energy-efficient group key management in wireless sensor networks
    • Jan
    • J.-H. Son, J.-S. Lee, and S.-W. Seo, "Topological key hierarchy for energy-efficient group key management in wireless sensor networks," Wireless personal communications, vol. 52, no. 2, pp. 359-382, Jan. 2010.
    • (2010) Wireless Personal Communications , vol.52 , Issue.2 , pp. 359-382
    • Son, J.-H.1    Lee, J.-S.2    Seo, S.-W.3
  • 18
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • Sept
    • A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, Sept. 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.3    Wen, V.4    Culler, D.E.5
  • 19
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • Second Quarter
    • Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications Surveys Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
    • (2006) IEEE Communications Surveys Tutorials , vol.8 , Issue.2 , pp. 2-23
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 20
    • 36849062175 scopus 로고    scopus 로고
    • Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks
    • Oct
    • M. Shi, X. Shen, Y. Jiang, and C. Lin, "Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks," IEEE Wireless Communications, vol. 14, no. 5, pp. 38-46, Oct. 2007.
    • (2007) IEEE Wireless Communications , vol.1 , Issue.5 , pp. 38-46
    • Shi, M.1    Shen, X.2    Jiang, Y.3    Lin, C.4
  • 21
    • 27644451730 scopus 로고    scopus 로고
    • The mote revolution: Low power wireless sensor network devices
    • J. Polastre, R. Szewczyk, C. Sharp, and D. Culler, "The mote revolution: Low power wireless sensor network devices," in Proc. of IEEE HotChips 16, vol. 16, pp. 22-24, 2004.
    • (2004) Proc. of IEEE HotChips 16 , vol.16 , pp. 22-24
    • Polastre, J.1    Szewczyk, R.2    Sharp, C.3    Culler, D.4
  • 25
    • 77952053188 scopus 로고    scopus 로고
    • MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks
    • June
    • X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks," Wireless Communications and Mobile Computing (Wiley), vol. 10, no. 6, pp. 843-856, June, 2010.
    • (2010) Wireless Communications and Mobile Computing (Wiley) , vol.1 , Issue.6 , pp. 843-856
    • Lin, X.1    Lu, R.2    Shen, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.