메뉴 건너뛰기




Volumn 16, Issue 6, 2014, Pages 401-410

Group rekeying in wireless sensor networks: A survey

Author keywords

Group rekeying; Security; Wireless sensor network

Indexed keywords

SENSOR NODES;

EID: 84909998552     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (40)
  • 1
    • 38149061688 scopus 로고    scopus 로고
    • Preventing dos attacks in wireless sensor networks: A repeated game theory approach
    • A. Agah and S. K. Das, "Preventing dos attacks in wireless sensor networks: A repeated game theory approach," International Journal of Network Security, vol. 5, no. 2, pp. 145-153, 2007.
    • (2007) International Journal of Network Security , vol.5 , Issue.2 , pp. 145-153
    • Agah, A.1    Das, S.K.2
  • 4
    • 84886451367 scopus 로고    scopus 로고
    • Performance analysis of steiner treebased decentralization mechanism (STDM) for privacy protection in wireless sensor networks
    • B. S. Babu, N. Jayashree, and P. Venkataram, "Performance analysis of steiner tree based decentralization mechanism (STDM) for privacy protection in wireless sensor networks," International Journal of Network Security, vol. 15, no. 5, pp. 331-340, 2013.
    • (2013) International Journal of Network Security , vol.15 , Issue.5 , pp. 331-340
    • Babu, B.S.1    Jayashree, N.2    Venkataram, P.3
  • 7
    • 84874673189 scopus 로고    scopus 로고
    • A novel dynamic key management scheme based on hamming distance for wireless sensor networks
    • R. Divya and T. Thirumurugan, "A novel dynamic key management scheme based on hamming distance for wireless sensor networks," International Journal of Scienti-c and Engineering Research, vol. 2, pp. 1-12, 2011.
    • (2011) International Journal of Scienti-c and Engineering Research , vol.2 , pp. 1-12
    • Divya, R.1    Thirumurugan, T.2
  • 10
    • 77950235531 scopus 로고    scopus 로고
    • A secure and scalable rekeying mechanism for hierarchical wireless sensor networks
    • S. Guo and V. Leung, "A secure and scalable rekeying mechanism for hierarchical wireless sensor networks," IEICE Transactions on Information and Systems, vol. E93D, no. 3, pp. 421-429, 2010.
    • (2010) IEICE Transactions on Information and Systems , vol.E93D , Issue.3 , pp. 421-429
    • Guo, S.1    Leung, V.2
  • 12
  • 13
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2, pp. 293-315, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 15
    • 80052938422 scopus 로고    scopus 로고
    • A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
    • C. T. Li and M. S. Hwang, "A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks," Information Sciences, vol. 181, no. 23, pp. 5333-5347, 2011.
    • (2011) Information Sciences , vol.181 , Issue.23 , pp. 5333-5347
    • Li, C.T.1    Hwang, M.S.2
  • 16
    • 49549085074 scopus 로고    scopus 로고
    • Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    • C. T. Li, M. S. Hwang, and Y. P. Chu, "Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks," International Journal of Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, 2008.
    • (2008) International Journal of Computer Systems Science and Engineering , vol.23 , Issue.3 , pp. 227-234
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 17
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • C. T. Li, M. S. Hwang, and Y. P. Chu, "A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks," Computer Communications, vol. 31, no. 12, pp. 2803-2814, 2008.
    • (2008) Computer Communications , vol.31 , Issue.12 , pp. 2803-2814
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 18
    • 69949155644 scopus 로고    scopus 로고
    • An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
    • C. T. Li, M. S. Hwang, and Y. P. Chu, "An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks," International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, 2009.
    • (2009) International Journal of Innovative Computing, Information and Control , vol.5 , Issue.8 , pp. 2107-2124
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 19
    • 33646842495 scopus 로고    scopus 로고
    • Data sampling control and compression in sensor networks
    • J. Li and J. Li, "Data sampling control and compression in sensor networks," Mobile Ad-hoc and Sensor Networks, vol. 3794, pp. 42-51, 2005.
    • (2005) Mobile Ad-hoc and Sensor Networks , vol.3794 , pp. 42-51
    • Li, J.1    Li, J.2
  • 20
    • 84903892162 scopus 로고    scopus 로고
    • Distributed detecting node replication attacks in wireless sensor networks: A survey
    • W. T. Li, T. H. Feng, and M. S. Hwang, "Distributed detecting node replication attacks in wireless sensor networks: A survey," International Journal of Network Security, vol. 16, no. 5, pp. 323-330, 2014.
    • (2014) International Journal of Network Security , vol.16 , Issue.5 , pp. 323-330
    • Li, W.T.1    Feng, T.H.2    Hwang, M.S.3
  • 24
    • 57049092255 scopus 로고    scopus 로고
    • Energy efficient key management (EEKM) protocol for large scale distributed sensor networks
    • K. J. PAEK, U. S. SONG, H. Y. KIM, J. KIM, and J. N. Hwang, "Energy efficient key management (EEKM) protocol for large scale distributed sensor networks," Journal of Information Science and Engineering, vol. 24, no. 6, pp. 1837-1858, 2008.
    • (2008) Journal of Information Science and Engineering , vol.24 , Issue.6 , pp. 1837-1858
    • Paek, K.J.1    Song, U.S.2    Kim, H.Y.3    Kim, J.4    Hwang, J.N.5
  • 26
    • 77956873542 scopus 로고    scopus 로고
    • A survey on key management mechanisms for distributed wireless sensor networks
    • M. A. Jr. Simplicio, P. S. L. M. Barreto, C. B. Margi, and T. C. M. B. Carvalho, "A survey on key management mechanisms for distributed wireless sensor networks," Computer Networks, vol. 54, no. 15, pp. 2591-2612, 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2591-2612
    • Simplicio Jr., M.A.1    Barreto, P.S.L.M.2    Margi, C.B.3    Carvalho, T.C.M.B.4
  • 28
    • 84874885967 scopus 로고    scopus 로고
    • Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
    • H. S. Soliman and M. Omari, "Application of synchronous dynamic encryption system (SDES) in wireless sensor networks," International Journal of Network Security, vol. 3, no. 2, pp. 160-171, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.2 , pp. 160-171
    • Soliman, H.S.1    Omari, M.2
  • 29
    • 75749084065 scopus 로고    scopus 로고
    • Muqami+: a scalable and locally distributed key management scheme for clustered sensor networks
    • M. K. R. R. Syed, H. Lee, S. Lee, and Y. K. Lee, "Muqami+: a scalable and locally distributed key management scheme for clustered sensor networks," Annuals of Telecommunications, vol. 65, no. 1-2, pp. 101-116, 2010.
    • (2010) Annuals of Telecommunications , vol.65 , Issue.1-2 , pp. 101-116
    • Syed, M.K.R.R.1    Lee, H.2    Lee, S.3    Lee, Y.K.4
  • 31
    • 78651566095 scopus 로고    scopus 로고
    • Lightweight key renewals for cluster sensor networks
    • G. Wang, S. Kim, D. Kang, and D. Choi, "Lightweight key renewals for cluster sensor networks," Journal of Networks, vol. 5, no. 3, pp. 300-312, 2010.
    • (2010) Journal of Networks , vol.5 , Issue.3 , pp. 300-312
    • Wang, G.1    Kim, S.2    Kang, D.3    Choi, D.4
  • 33
    • 77958579747 scopus 로고    scopus 로고
    • An efficient scheme for removing compromised sensor nodes from wireless sensor networks
    • Y. Wang, B. Ramamurthy, X. Zou, and Y. Xue, "An efficient scheme for removing compromised sensor nodes from wireless sensor networks," Security and Communication Networks, vol. 3, no. 4, pp. 320-333, 2010.
    • (2010) Security and Communication Networks , vol.3 , Issue.4 , pp. 320-333
    • Wang, Y.1    Ramamurthy, B.2    Zou, X.3    Xue, Y.4
  • 34
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, vol. 30, no. 11, pp. 2314-2341, 2007.
    • (2007) Computer Communications , vol.30 , Issue.11 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 36
    • 79952143873 scopus 로고    scopus 로고
    • EDDK: energyefficient distributed deterministic key management for wireless sensor networks
    • X. Zhang, J. He, and Q. Wei, "EDDK: energyefficient distributed deterministic key management for wireless sensor networks," EURASIP Journal on Wireless Communications and Networking, vol. 2011:765143 doi:10.1155/2011/765143, 2011.
    • (2011) EURASIP Journal on Wireless Communications and Networking , vol.2011 , pp. 765143
    • Zhang, X.1    He, J.2    Wei, Q.3
  • 38
    • 64049117542 scopus 로고    scopus 로고
    • Predistribution and local collaborationbased group rekeying for wireless sensor networks
    • W. Zhanga, S. Zhub, and G. Caob, "Predistribution and local collaborationbased group rekeying for wireless sensor networks," Ad Hoc Networks, vol. 7, no. 6, pp. 1229-1242, 2009.
    • (2009) Ad Hoc Networks , vol.7 , Issue.6 , pp. 1229-1242
    • Zhanga, W.1    Zhub, S.2    Caob, G.3
  • 40
    • 33847120377 scopus 로고    scopus 로고
    • Leap+: efficient security mechanisms for largescale distributed sensor networks
    • S. Zhu, S. Setia, and S. Jajodia, "Leap+: efficient security mechanisms for largescale distributed sensor networks," ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500-528, 2006.
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.