메뉴 건너뛰기




Volumn 13, Issue 10, 2013, Pages 3677-3684

Practical secure communication for integrating wireless sensor networks into the internet of things

Author keywords

identity based cryptography; Internet of things; public key infrastructure; security; signcryption; Wireless sensor network

Indexed keywords

IDENTITY BASED CRYPTOGRAPHY; INTERNET OF THINGS (IOT); PUBLIC KEY INFRASTRUCTURE; SECURITY; SIGNCRYPTION;

EID: 84883394343     PISSN: 1530437X     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSEN.2013.2262271     Document Type: Article
Times cited : (168)

References (24)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Oct.
    • L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey, " Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 2
    • 67649560482 scopus 로고    scopus 로고
    • Integrating wireless sensor networks and the internet: A security analysis
    • R. Roman and J. Lopez, "Integrating wireless sensor networks and the Internet: A security analysis, " Internet Res., vol. 19, no. 2, pp. 246-259, 2009.
    • (2009) Internet Res. , vol.19 , Issue.2 , pp. 246-259
    • Roman, R.1    Lopez, J.2
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2139. New York, NY, USA: Springer-Verlag, 2001, pp. 213-229. (Pubitemid 33317917)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 4
    • 63449122349 scopus 로고    scopus 로고
    • Digital Signcryption or How to Achieve Cost (Signature & Encryption) Cost (Signature) + Cost (Encryption)
    • Advances in Cryptology - CRYPTO '97
    • Y. Zheng, "Digital signcryption or how to achieve cost (signature & encryption)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1294 , pp. 165-179
    • Zheng, Y.1
  • 5
    • 84958948780 scopus 로고    scopus 로고
    • A signcryption scheme with signature directly verifiable by public key
    • Public Key Cryptography
    • F. Bao and R. H. Deng, "A signcryption scheme with signature directly verifiable by public key, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 1431. New York, NY, USA: Springer-Verlag, 1998, pp. 55-59. (Pubitemid 128101696)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1431 , pp. 55-59
    • Bao, F.1    Deng, R.H.2
  • 7
    • 34347373013 scopus 로고    scopus 로고
    • Two birds one stone: Signcryption using rsa
    • New York, NY, USA: Springer-Verlag
    • J. Malone-Lee and W. Mao, "Two birds one stone: Signcryption using RSA, " in Topics in Cryptology (Lecture Notes in Computer Science), vol. 2612. New York, NY, USA: Springer-Verlag, 2003, pp. 211-226.
    • (2003) Topics in Cryptology (Lecture Notes in Computer Science) , vol.2612 , pp. 211-226
    • Malone-Lee, J.1    Mao, W.2
  • 8
    • 77954549125 scopus 로고    scopus 로고
    • An efficient signcryption scheme with key privacy and its extension to ring signcryption
    • C. K. Li, G. Yang, D. S. Wong, X. Deng, and S. S. M. Chow, "An efficient signcryption scheme with key privacy and its extension to ring signcryption, " J. Comput. Security, vol. 18, no. 3, pp. 451-473, 2010.
    • (2010) J. Comput. Security , vol.18 , Issue.3 , pp. 451-473
    • Li, C.K.1    Yang, G.2    Wong, D.S.3    Deng, X.4    Chow, S.S.M.5
  • 10
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity
    • New York, NY, USA: Springer-Verlag
    • S. S. M. Chow, S. M. Yiu, L. C. K. Hui, and K. P. Chow, "Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity, " in Information Security and Cryptology (Lecture Notes in Computer Science), vol. 2971. New York, NY, USA: Springer-Verlag, 2004, pp. 352-369.
    • (2004) Information Security and Cryptology (Lecture Notes in Computer Science) , vol.2971 , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 12
    • 24144498013 scopus 로고    scopus 로고
    • Improved identity-based signcryption
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • L. Chen and J. Malone-Lee, "Improved identity-based signcryption, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 3386. New York, NY, USA: Springer-Verlag, 2005, pp. 362-379. (Pubitemid 41231343)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 362-379
    • Chen, L.1    Malone-Lee, J.2
  • 14
    • 77952300651 scopus 로고    scopus 로고
    • Efficient signcryption between tpkc and idpkc and its multi-receiver construction
    • Mar.
    • Y. Sun and H. Li, "Efficient signcryption between TPKC and IDPKC and its multi-receiver construction, " Sci. China Inf. Sci., vol. 53, no. 3, pp. 557-566, Mar. 2010.
    • (2010) Sci. China Inf. Sci. , vol.53 , Issue.3 , pp. 557-566
    • Sun, Y.1    Li, H.2
  • 15
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • New York, NY, USA: Springer-Verlag
    • J.H. An, Y. Dodis, and T. Rabin, "On the security of joint signature and encryption, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2332. New York, NY, USA: Springer-Verlag, 2002, pp. 83-107.
    • (2002) Advances in Cryptology (Lecture Notes in Computer Science) , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 16
    • 79953819495 scopus 로고    scopus 로고
    • Heterogeneous signcryption with key privacy
    • Apr.
    • Q. Huang, D. S. Wong, and G. Yang, "Heterogeneous signcryption with key privacy, " Comput. J., vol. 54, no. 4, pp. 525-536, Apr. 2011.
    • (2011) Comput. J. , vol.54 , Issue.4 , pp. 525-536
    • Huang, Q.1    Wong, D.S.2    Yang, G.3
  • 17
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Jan.
    • D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures, " J. Cryptol., vol. 13, no. 3, pp. 361-396, Jan. 2000.
    • (2000) J. Cryptol. , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 18
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • New York, NY, USA: Springer-Verlag
    • D. Boneh and X. Boyen, "Short signatures without random oracles, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3027. New York, NY, USA: Springer-Verlag, 2004, pp. 56-73.
    • (2004) Advances in Cryptology (Lecture Notes in Computer Science) , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 20
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • New York, NY, USA: Springer-Verlag
    • F. Hess, "Efficient identity based signature schemes based on pairings, " in Selected Areas in Cryptography (Lecture Notes in Computer Science), vol. 2595. New York, NY, USA: Springer-Verlag, 2003, pp. 310-324.
    • (2003) Selected Areas in Cryptography (Lecture Notes in Computer Science) , vol.2595 , pp. 310-324
    • Hess, F.1
  • 21
    • 37849018826 scopus 로고    scopus 로고
    • An efficient identity-based signature scheme and its applications
    • Jul.
    • S. Cui, P. Duan, C.W. Chan, and X. Cheng, "An efficient identity-based signature scheme and its applications, " Int. J. Netw. Security, vol. 5, no. 1, pp. 89-98, Jul. 2007.
    • (2007) Int. J. Netw. Security , vol.5 , Issue.1 , pp. 89-98
    • Cui, S.1    Duan, P.2    Chan, C.W.3    Cheng, X.4
  • 24
    • 84855178558 scopus 로고    scopus 로고
    • On the energy cost of authenticated key agreement in wireless sensor networks
    • Jan.
    • D. Galindo1, R. Roman, and J. Lopez, "On the energy cost of authenticated key agreement in wireless sensor networks, " Wireless Commun. Mobile Comput., vol. 12, no. 1, pp. 133-143, Jan. 2012.
    • (2012) Wireless Commun. Mobile Comput. , vol.12 , Issue.1 , pp. 133-143
    • Galindo, D.1    Roman, R.2    Lopez, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.