메뉴 건너뛰기




Volumn 47, Issue 2, 2014, Pages

Node-capture resilient key establishment in sensor networks: Design space and new protocols

Author keywords

Insider tolerance; Key distribution; Wireless sensor networks

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; INTERNET PROTOCOLS; NETWORK SECURITY; WIRELESS SENSOR NETWORKS;

EID: 84907912876     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2636344     Document Type: Article
Times cited : (25)

References (41)
  • 2
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • Springer
    • Rolf Blom. 1985. An optimal class of symmetric key generation systems. In Advances in Cryptology. Springer, 335-338.
    • (1985) Advances in Cryptology , pp. 335-338
    • Blom, R.1
  • 7
    • 0141621107 scopus 로고    scopus 로고
    • Meshed multipath routing with selective forwarding: An efficient strategy in wireless sensor networks
    • Swades De, Chunming Qiao, and Hongyi Wu. 2003. Meshed multipath routing with selective forwarding: An efficient strategy in wireless sensor networks. Computer Networks 43, 4, 481-497.
    • (2003) Computer Networks , vol.43 , Issue.4 , pp. 481-497
    • De, S.1    Qiao, C.2    Wu, H.3
  • 8
    • 49249123418 scopus 로고    scopus 로고
    • Multipath key establishment for wireless sensor networks using just-enough redundancy transmission
    • Jing Deng and Yunghsiang S. Han. 2008. Multipath key establishment for wireless sensor networks using just-enough redundancy transmission. IEEE Transactions on Dependable and Secure Computing 5, 3, 177-190.
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.5 , Issue.3 , pp. 177-190
    • Deng, J.1    Han, Y.S.2
  • 17
    • 84891375453 scopus 로고    scopus 로고
    • Adaptive random key distribution schemes for wireless sensor networks
    • Springer
    • Shih-I Huang, Shiuhpyng Shieh, and S. Y.Wu. 2005. Adaptive random key distribution schemes for wireless sensor networks. In Computer Security in the 21st Century. Springer, 91-105.
    • (2005) Computer Security in the 21st Century , pp. 91-105
    • Huang, S.-I.1    Shieh, S.2    Wu, S.Y.3
  • 18
    • 0020175940 scopus 로고    scopus 로고
    • The complexity of finding maximum disjoint paths with length constraints
    • Alon Itai, Yehoshua Perl, and Yossi Shiloach. 2006. The complexity of finding maximum disjoint paths with length constraints. Networks 12, 3, 277-286.
    • (2006) Networks , vol.12 , Issue.3 , pp. 277-286
    • Itai, A.1    Perl, Y.2    Shiloach, Y.3
  • 20
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1, 2, 293-315.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 25
    • 47049108659 scopus 로고    scopus 로고
    • Air pollution monitoring and mining based on sensor grid in London
    • Yajie Ma, Mark Richards, Moustafa Ghanem, Yike Guo, and John Hassard. 2008. Air pollution monitoring and mining based on sensor grid in London. Sensors 8, 6, 3601-3623.
    • (2008) Sensors , vol.8 , Issue.6 , pp. 3601-3623
    • Ma, Y.1    Richards, M.2    Ghanem, M.3    Guo, Y.4    Hassard, J.5
  • 28
    • 34548043438 scopus 로고    scopus 로고
    • Pair-wise path key establishment in wireless sensor networks
    • Jang-Ping Sheu and Jui-Che Cheng. 2007. Pair-wise path key establishment in wireless sensor networks. Computer Communications 30, 11, 2365-2374.
    • (2007) Computer Communications , vol.30 , Issue.11 , pp. 2365-2374
    • Sheu, J.-P.1    Cheng, J.-C.2
  • 30
    • 77956873542 scopus 로고    scopus 로고
    • A survey on key management mechanisms for distributed wireless sensor networks
    • Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Cintia B. Margi, and Tereza C. M. B. Carvalho. 2010. A survey on key management mechanisms for distributed wireless sensor networks. Computer Networks 54, 15, 2591-2612.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2591-2612
    • Simplício, M.A.1    Barreto, P.S.L.M.2    Margi, C.B.3    Carvalho, T.C.M.B.4
  • 33
    • 80052911053 scopus 로고    scopus 로고
    • Three improved algorithms for multipath key establishment in sensor networks using protocols for secure message transmission
    • Jiang Wu and Douglas R. Stinson. 2011. Three improved algorithms for multipath key establishment in sensor networks using protocols for secure message transmission. IEEE Transactions on Dependable and Secure Computing 8, 6, 929-937.
    • (2011) IEEE Transactions on Dependable and Secure Computing , vol.8 , Issue.6 , pp. 929-937
    • Wu, J.1    Stinson, D.R.2
  • 34
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • Wenyuan Xu, Ke Ma, Wade Trappe, and Yanyong Zhang. 2006. Jamming sensor networks: Attack and defense strategies. IEEE Network 20, 3, 41-47.
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 38
    • 79953815867 scopus 로고    scopus 로고
    • A secure key establishment protocol for ZigBee wireless sensor networks
    • Ender Yüksel, Hanne Riis Nielson, and Flemming Nielson. 2011. A secure key establishment protocol for ZigBee wireless sensor networks. Computer Journal 54, 4, 589-601.
    • (2011) Computer Journal , vol.54 , Issue.4 , pp. 589-601
    • Yüksel, E.1    Nielson, H.R.2    Nielson, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.