메뉴 건너뛰기




Volumn 25, Issue 3, 2014, Pages 750-761

Secure and efficient data transmission for cluster-based wireless sensor networks

Author keywords

Cluster based WSNs; ID based digital signature; ID based online offline digital signature; secure data transmission protocol

Indexed keywords


EID: 84894526330     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2013.43     Document Type: Article
Times cited : (155)

References (37)
  • 1
    • 77956303800 scopus 로고    scopus 로고
    • Wireless sensor network technologies for the information explosion era
    • Springer-Verlag
    • T. Hara, V.I. Zadorozhny, and E. Buchmann, Wireless Sensor Network Technologies for the Information Explosion Era, Studies in Computational Intelligence, vol. 278. Springer-Verlag, 2010.
    • (2010) Studies in Computational Intelligence , vol.278
    • Hara, T.1    Zadorozhny, V.I.2    Buchmann, E.3
  • 2
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • Second Quarter
    • Y. Wang, G. Attebury, and B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks, " IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
    • (2006) IEEE Comm. Surveys & Tutorials , vol.8 , Issue.2 , pp. 2-23
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 3
    • 34548850872 scopus 로고    scopus 로고
    • A survey on clustering algorithms for wireless sensor networks
    • A.A. Abbasi and M. Younis, "A Survey on Clustering Algorithms for Wireless Sensor Networks, " Computer Comm., vol. 30, nos. 14/15, pp. 2826-2841, 2007.
    • (2007) Computer Comm. , vol.30 , Issue.14-15 , pp. 2826-2841
    • Abbasi, A.A.1    Younis, M.2
  • 4
    • 33646589837 scopus 로고    scopus 로고
    • An application-specific protocol architecture for wireless microsen-sor networks
    • Oct.
    • W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsen-sor Networks, " IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
    • (2002) IEEE Trans. Wireless Comm. , vol.1 , Issue.4 , pp. 660-670
    • Heinzelman, W.1    Chandrakasan, A.2    Balakrishnan, H.3
  • 5
    • 0036964041 scopus 로고    scopus 로고
    • An analytical model for information retrieval in wireless sensor networks using enhanced apteen protocol
    • Dec.
    • A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, "An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol, " IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.
    • (2002) IEEE Trans. Parallel & Distributed Systems , vol.13 , Issue.12 , pp. 1290-1302
    • Manjeshwar, A.1    Zeng, Q.-A.2    Agrawal, D.P.3
  • 6
    • 34548825399 scopus 로고    scopus 로고
    • PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks
    • S. Yi et al., "PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks, " Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.
    • (2007) Computer Comm. , vol.30 , Issue.14-15 , pp. 2842-2852
    • Yi, S.1
  • 7
    • 84894531690 scopus 로고    scopus 로고
    • Design and implementation issues of clustering in wireless sensor networks
    • K. Pradeepa, W.R. Anne, and S. Duraisamy, "Design and Implementation Issues of Clustering in Wireless Sensor Networks, " Int'l J. Computer Applications, vol. 47, no. 11, pp. 23-28, 2012.
    • (2012) Int'l J. Computer Applications , vol.47 , Issue.11 , pp. 23-28
    • Pradeepa, K.1    Anne, W.R.2    Duraisamy, S.3
  • 8
    • 34547913472 scopus 로고    scopus 로고
    • SecLEACH-on the security of clustered sensor networks
    • L.B. Oliveira et al., "SecLEACH-On the Security of Clustered Sensor Networks, " Signal Processing, vol. 87, pp. 2882-2895, 2007.
    • (2007) Signal Processing , vol.87 , pp. 2882-2895
    • Oliveira, L.B.1
  • 11
    • 79952929509 scopus 로고    scopus 로고
    • A survey on secure hierarchical routing protocols in wireless sensor networks
    • S. Sharma and S.K. Jena, "A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks, " Proc. Int'l Conf. Comm., Computing & Security (ICCCS), pp. 146-151, 2011.
    • (2011) Proc. Int'l Conf. Comm., Computing & Security (ICCCS , pp. 146-151
    • Sharma, S.1    Jena, S.K.2
  • 13
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. Hellman, "New Directions in Cryptography, " IEEE Trans. Information Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Information Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 14
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-Based Cryptosystems and Signature Schemes, " Proc. Advances in Cryptology (CRYPTO), pp. 47-53, 1985.
    • (1985) Proc. Advances in Cryptology (CRYPTO , pp. 47-53
    • Shamir, A.1
  • 15
    • 33845463647 scopus 로고    scopus 로고
    • New directions in sensor network key management
    • D.W. Carman, "New Directions in Sensor Network Key Management, " Int'l J. Distributed Sensor Networks, vol. 1, pp. 3-15, 2005.
    • (2005) Int'l J. Distributed Sensor Networks , vol.1 , pp. 3-15
    • Carman, D.W.1
  • 17
    • 79551633433 scopus 로고    scopus 로고
    • A secure routing protocol for cluster-based wireless sensor networks using id-based digital signature
    • H. Lu, J. Li, and H. Kameda, "A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature, " Proc. IEEE GLOBECOM, pp. 1-5, 2010.
    • (2010) Proc. IEEE GLOBECOM , pp. 1-5
    • Lu, H.1    Li, J.2    Kameda, H.3
  • 18
    • 77955229114 scopus 로고    scopus 로고
    • An identity-based security system for user privacy in vehicular ad hoc networks
    • Sept.
    • J. Sun et al., "An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks, " IEEE Trans. Parallel & Distributed Systems, vol. 21, no. 9, pp. 1227-1239, Sept. 2010.
    • (2010) IEEE Trans. Parallel & Distributed Systems , vol.21 , Issue.9 , pp. 1227-1239
    • Sun, J.1
  • 21
    • 77955088735 scopus 로고    scopus 로고
    • Efficient online/offline identity-based signature for wireless sensor network
    • J. Liu et al., "Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network, " Int'l J. Information Security, vol. 9, no. 4, pp. 287-296, 2010.
    • (2010) Int'l J. Information Security , vol.9 , Issue.4 , pp. 287-296
    • Liu, J.1
  • 23
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, " Ad Hoc Networks, vol. 1, nos. 2/3, pp. 293-315, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 25
    • 84894513711 scopus 로고
    • An introduction to the theory of groups, fourth ed
    • Verlag
    • J.J. Rotman, An Introduction to the Theory of Groups, fourth ed. Springer-Verlag, 1994.
    • (1994) Springer
    • Rotman, J.J.1
  • 31
    • 70449477091 scopus 로고    scopus 로고
    • A hierarchical clustering-based routing protocol for wireless sensor networks supporting multiple data aggregation qualities
    • Y. Jia, L. Zhao, and B. Ma, "A Hierarchical Clustering-Based Routing Protocol for Wireless Sensor Networks Supporting Multiple Data Aggregation Qualities, " IEEE Trans. Parallel & Distributed Systems, vol. 4, nos. 1/2, pp. 79-91, 2008.
    • (2008) IEEE Trans. Parallel & Distributed Systems , vol.4 , Issue.1-2 , pp. 79-91
    • Jia, Y.1    Zhao, L.2    Ma, B.3
  • 32
    • 84894552782 scopus 로고    scopus 로고
    • OMNeT++ Community
    • "OMNeT++, " OMNeT++ Community, http://www.omnetpp.org/, 2013.
    • (2013) OMNeT++
  • 33
    • 36849062699 scopus 로고    scopus 로고
    • Intrusion detection techniques in mobile ad hoc and wireless sensor networks
    • Oct.
    • B. Sun et al., "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks, " IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 56-63, Oct. 2007.
    • (2007) IEEE Wireless Comm. Magazine , vol.14 , Issue.5 , pp. 56-63
    • Sun, B.1
  • 36
    • 85000276942 scopus 로고    scopus 로고
    • Multilevel/itesla: Broadcast authentication for distributed sensor networks
    • D. Liu and P. Ning, "Multilevel/iTESLA: Broadcast Authentication for Distributed Sensor Networks, " ACM Trans. Embedded Computing Systems, vol. 3, pp. 800-836, 2004.
    • (2004) ACM Trans. Embedded Computing Systems , vol.3 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 37
    • 84894597195 scopus 로고    scopus 로고
    • Crossbow Technology
    • "Crossbow Stargate, " Crossbow Technology, http://bullseye. xbow. com:81/Products/productdetails.aspx?sid=229, 2013.
    • (2013) Crossbow Stargate


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.