메뉴 건너뛰기




Volumn 13, Issue 10, 2013, Pages 3693-3701

A lightweight multicast authentication mechanism for small scale IoT applications

Author keywords

absorbency; IoT; multicast authentication; one way accumulator; quasi commutative

Indexed keywords

ABSORBENCY; AUTHENTICATION MECHANISMS; INTERNET OF THING (IOTS); IOT; ONE-WAY ACCUMULATORS; PERFORMANCE ASPECTS; QUASI-COMMUTATIVE; SECURED COMMUNICATION;

EID: 84883421524     PISSN: 1530437X     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSEN.2013.2266116     Document Type: Article
Times cited : (117)

References (34)
  • 1
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • Sep.
    • R. Roman, P. Najera, and J. Lpoez, "Securing the internet of things, " Comput., vol. 44, no. 9, pp. 51-58, Sep. 2011.
    • (2011) Comput. , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lpoez, J.3
  • 3
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things-new security and privacy challenges
    • Jan.
    • R. H. Weber, "Internet of things-New security and privacy challenges, " Comput. Law Security Rev., vol. 26, no. 1, pp. 23-30, Jan. 2010.
    • (2010) Comput. Law Security Rev. , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1
  • 4
    • 79959280293 scopus 로고    scopus 로고
    • Internet of things: Applications and challenges in technology and standardization
    • May
    • D. Bandyopadhyay and J. Sen, "Internet of things: Applications and challenges in technology and standardization, " Wireless Pers. Commun., vol. 58, no. 1, pp. 49-69, May 2011.
    • (2011) Wireless Pers. Commun. , vol.58 , Issue.1 , pp. 49-69
    • Bandyopadhyay, D.1    Sen, J.2
  • 6
    • 84879054217 scopus 로고    scopus 로고
    • Adopting the internet of things technologies in environmental management in south africa
    • Apr.
    • N. Dlodlo, "Adopting the internet of things technologies in environmental management in South Africa, " in Proc. Int. Conf. Environ. Sci. Eng., vol. 3. Apr. 2012, pp. 45-55.
    • (2012) Proc. Int. Conf. Environ. Sci. Eng. , vol.3 , pp. 45-55
    • Dlodlo, N.1
  • 8
    • 84877917534 scopus 로고    scopus 로고
    • Internet of things (iot) services: Architecture and its application in e-commerce
    • Jul.-Sep.
    • X. Shang, R. Zhang, and Y. Chen, "Internet of things (IoT) services: Architecture and its application in E-commerce, " J. Electron. Commerce Org., vol. 10, no. 3, pp. 44-55, Jul.-Sep. 2012.
    • (2012) J. Electron. Commerce Org. , vol.10 , Issue.3 , pp. 44-55
    • Shang, X.1    Zhang, R.2    Chen, Y.3
  • 11
    • 84857045957 scopus 로고    scopus 로고
    • Accelerating signature-based broadcast authentication for wireless sensor networks
    • Jun.
    • X. Fan and G. Gong, "Accelerating signature-based broadcast authentication for wireless sensor networks, " Ad Hoc Netw., vol. 10, no. 4, pp. 723-736, Jun. 2012.
    • (2012) Ad Hoc Netw. , vol.10 , Issue.4 , pp. 723-736
    • Fan, X.1    Gong, G.2
  • 12
    • 34547488838 scopus 로고    scopus 로고
    • Lower bounds for multicast message authentication
    • D. Boneh, G. Durfee, and M. Franklin, "Lower bounds for multicast message authentication, " in Proc. Adv. Cryptol., 2001, pp. 434-450.
    • (2001) Proc. Adv. Cryptol. , pp. 434-450
    • Boneh, D.1    Durfee, G.2    Franklin, M.3
  • 13
    • 39049094066 scopus 로고    scopus 로고
    • IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
    • DOI 10.1016/j.comcom.2007.10.017, PII S0140366407004239
    • X. Cao, W. Kou, L. Dang, and B. Zhao, "IMBAS: Identity-based multiuser broadcast authentication in wireless sensor networks, " Comput. Commun., vol. 31, no. 4, pp. 659-67, 2008. (Pubitemid 351248940)
    • (2008) Computer Communications , vol.31 , Issue.4 , pp. 659-667
    • Cao, X.1    Kou, W.2    Dang, L.3    Zhao, B.4
  • 15
    • 70350230005 scopus 로고    scopus 로고
    • Multi-user broadcast authentication in wireless sensor networks
    • Oct.
    • K. Ren, S. Yu, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks, " IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4554-4564, Oct. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.8 , pp. 4554-4564
    • Ren, K.1    Yu, S.2    Lou, W.3    Zhang, Y.4
  • 18
    • 35048876343 scopus 로고    scopus 로고
    • Security proofs for identity-based identification and signature schemes
    • M. Bellare, C. Namprempre, and G. Neven, "Security proofs for identity-based identification and signature schemes, " in Proc. Adv. Cryptol., vol. 3027. 2004, pp. 268-286.
    • (2004) Proc. Adv. Cryptol. , vol.3027 , pp. 268-286
    • Bellare, M.1    Namprempre, C.2    Neven, G.3
  • 20
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • DOI 10.1109/TWC.2007.060255
    • K. Ren, K. Zeng, W. Lou, and P. J. Moran, "On broadcast authentication in wireless sensor networks, " IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136-4144, Nov. 2007. (Pubitemid 350121763)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.11 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.J.4
  • 21
    • 85000276942 scopus 로고    scopus 로고
    • Multi-level μtesla: Broadcast authentication for distributed sensor networks
    • D. Liu and P. Ning, "Multi-level μTESLA: Broadcast authentication for distributed sensor networks, " ACM Trans. Embedded Comput. Syst., vol. 3, no. 4, pp. 800-836, 2004.
    • (2004) ACM Trans. Embedded Comput. Syst. , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 24
    • 56749151138 scopus 로고    scopus 로고
    • Pre-authentication filters: Providing dos resistance for signature-based broadcast authentication in wireless sensor networks
    • Q. Dong, D. Liu, and P. Ning, "Pre-authentication filters: Providing DoS resistance for signature-based broadcast authentication in wireless sensor networks, " in Proc. 1st ACM Conf. Wireless Netw. Security, 2008, pp. 2-12.
    • (2008) Proc. 1st ACM Conf. Wireless Netw. Security , pp. 2-12
    • Dong, Q.1    Liu, D.2    Ning, P.3
  • 25
    • 41849094781 scopus 로고    scopus 로고
    • Mitigate dos attacks against broadcast authentication in wireless sensor networks
    • P. Ning, A. Liu, and W. Du, "Mitigate DOS attacks against broadcast authentication in wireless sensor networks, " ACM Trans. Sensor Netw., vol. 4, no. 1, pp. 1:1-1:35, 2008.
    • (2008) ACM Trans. Sensor Netw. , vol.4 , Issue.1 , pp. 11-135
    • Ning, P.1    Liu, A.2    Du, W.3
  • 30
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • R. Merkle, "A digital signature based on a conventional encryption function, " in Proc. Adv. Cryptol., 1988, pp. 369-378.
    • (1988) Proc. Adv. Cryptol. , pp. 369-378
    • Merkle, R.1
  • 31
    • 84947431932 scopus 로고    scopus 로고
    • Better than biba: Short one-time signatures with fast signing and verifying
    • Jul.
    • L. Reyzin and N. Reyzin, "Better than BiBa: Short one-time signatures with fast signing and verifying, " in Proc. 7th Australasian Conf., Jul. 2002, pp. 144-153.
    • (2002) Proc. 7th Australasian Conf , pp. 144-153
    • Reyzin, L.1    Reyzin, N.2
  • 33
    • 0002809150 scopus 로고
    • One-way accumulators: A decentralized alternative to digital signatures
    • J. Benaloh and M. de Mare, "One-way accumulators: A decentralized alternative to digital signatures, " in Proc. Adv. Cryptol., 1993, pp. 274-285.
    • (1993) Proc. Adv. Cryptol. , pp. 274-285
    • Benaloh, J.1    De Mare, M.2
  • 34
    • 78650774939 scopus 로고    scopus 로고
    • Broadcast authentication algorithm for wireless sensor networks
    • Nov.
    • X. Yao, X. Zheng, and X. Zhou, "Broadcast authentication algorithm for wireless sensor networks, " J. China Inst. Commun., vol. 31, no. 11, pp. 49-55, Nov. 2010.
    • (2010) J. China Inst. Commun. , vol.31 , Issue.11 , pp. 49-55
    • Yao, X.1    Zheng, X.2    Zhou, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.