메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; INTERNET; INTERNET OF THINGS; MOBILE SECURITY; SENSOR NODES;

EID: 84928029871     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2014/357430     Document Type: Article
Times cited : (121)

References (34)
  • 3
    • 85045834571 scopus 로고    scopus 로고
    • Zig bee specification version 1.0
    • "Zig Bee Specification Version 1.0", Zig Bee Alliance, 2008, http://www.zigbee.org/home.aspx.
    • (2008) Zig Bee Alliance
  • 4
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things-new security and privacy challenges
    • R. H. Weber, "Internet of things-new security and privacy challenges", Computer Law and Security Review, vol. 26, no. 1, pp. 23-30, 2010.
    • (2010) Computer Law and Security Review , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1
  • 5
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): a vision, architectural elements, and future directions", Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 7
    • 84879225866 scopus 로고    scopus 로고
    • Onthe features andchallenges of security and privacy in distributed internet of things
    • R. Roman, J. Zhou, and J. Lopez, "Onthe features andchallenges of security and privacy in distributed internet of things", Computer Networks, vol. 57, no. 10, pp. 2266-2279, 2013.
    • (2013) Computer Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 8
    • 70449596680 scopus 로고    scopus 로고
    • IPv6 over low-power wireless personal area networks (6Lo WPANs): Overview, assumptions, problem statement, and goals
    • N. Kushalnagar, G. Montenegro, and C. Schumacher", IPv6 over Low-Power Wireless Personal Area Networks (6Lo WPANs): overview, Assumptions, Problem Statement, and Goals", IETF RFC 4919, 2007, http://tools.ietf.org/html/rfc4919.
    • (2007) IETF RFC 4919
    • Kushalnagar, N.1    Montenegro, G.2    Schumacher, C.3
  • 9
    • 46449128945 scopus 로고    scopus 로고
    • Transmission of IPv6 packets over IEEE 802.15.4 networks
    • September
    • G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, "Transmission of IPv6 packets over IEEE 802.15.4 networks", IETF R FC 4944, September 2007, http://tools.ietf.org/html/rfc4944.
    • (2007) IETF R FC 4944
    • Montenegro, G.1    Kushalnagar, N.2    Hui, J.3    Culler, D.4
  • 10
    • 78650911380 scopus 로고    scopus 로고
    • Constrained application protocol (CoAP)
    • R FC editor
    • Z. Shelby, K. Hartke, and C. Bormann, "Constrained Application Protocol (CoAP)", IETF draft, R FC editor, 2013, http://tools.ietf.org/pdf/draft-ietf-core-coap-18.pdf.
    • (2013) IETF Draft
    • Shelby, Z.1    Hartke, K.2    Bormann, C.3
  • 11
    • 84871266331 scopus 로고    scopus 로고
    • RPL: IPv6 routing protocol for low-power and lossy networks
    • T. Winter, P. Thubert, A. Brandt et al., "RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks", IETF RFC 6550, 2012, http://tools.ietf.org/html/rfc6550.
    • (2012) IETF RFC 6550
    • Winter, T.1    Thubert, P.2    Brandt, A.3
  • 13
    • 84858220235 scopus 로고    scopus 로고
    • Private entity authentication for pervasive computing environments
    • F. Zhu, M. W. Mutka, and L. M. Ni, "Private entity authentication for pervasive computing environments", International Journal of Network Security, vol. 14, no. 2, pp. 86-100, 2012.
    • (2012) International Journal of Network Security , vol.14 , Issue.2 , pp. 86-100
    • Zhu, F.1    Mutka, M.W.2    Ni, L.M.3
  • 14
    • 84934949842 scopus 로고    scopus 로고
    • An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment
    • S. Shin, T. Shon, H. Yeh, and K. Kim, "An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment", Peer-to-Peer Networking and Applications, 2013.
    • (2013) Peer-to-peer Networking and Applications
    • Shin, S.1    Shon, T.2    Yeh, H.3    Kim, K.4
  • 15
    • 84862848192 scopus 로고    scopus 로고
    • PKC based broadcast authentication using signature amortization for WSNs
    • Y. Liu, J. Li, and M. Guizani, "PKC based broadcast authentication using signature amortization for WSNs", IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2106-2115, 2012.
    • (2012) IEEE Transactions on Wireless Communications , vol.11 , Issue.6 , pp. 2106-2115
    • Liu, Y.1    Li, J.2    Guizani, M.3
  • 16
    • 77954163084 scopus 로고    scopus 로고
    • Secure and efficient broadcast authentication in wireless sensor networks
    • T. Kwon and J. Hong, "Secure and efficient broadcast authentication in wireless sensor networks", IEEE Transactions on Computers, vol. 59, no. 8, pp. 1120-1133, 2010.
    • (2010) IEEE Transactions on Computers , vol.59 , Issue.8 , pp. 1120-1133
    • Kwon, T.1    Hong, J.2
  • 17
    • 35248893214 scopus 로고    scopus 로고
    • Datagram transport layer security
    • April, http://tools.ietf.org/html/rfc4347
    • E. Rescorla and N. Modadugu, "Datagram Transport Layer Security", IETF RFC 4347, April 2006, http://tools.ietf.org/html/http://tools.ietf.org/html/rfc4347.
    • (2006) IETF RFC 4347
    • Rescorla, E.1    Modadugu, N.2
  • 18
    • 84885304488 scopus 로고    scopus 로고
    • DTLS based security and two-way authentication for the Internet of Things
    • T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, "DTLS based security and two-way authentication for the Internet of Things", Ad Hoc Networks, vol. 11, no. 8, pp. 2710-2723, 2013.
    • (2013) Ad Hoc Networks , vol.11 , Issue.8 , pp. 2710-2723
    • Kothmayr, T.1    Schmitt, C.2    Hu, W.3    Brünig, M.4    Carle, G.5
  • 19
    • 70349646298 scopus 로고    scopus 로고
    • Design and implementation of a secure wireless mote-based medical sensor network
    • K. Malasri and L. Wang, "Design and implementation of a secure wireless mote-based medical sensor network", Sensors, vol. 9, no. 8, pp. 6273-6297, 2009.
    • (2009) Sensors , vol.9 , Issue.8 , pp. 6273-6297
    • Malasri, K.1    Wang, L.2
  • 20
    • 79953785474 scopus 로고    scopus 로고
    • GRS: The green, reliability, and security of emerging machine to machine communications
    • R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, "GRS: the green, reliability, and security of emerging machine to machine communications", IEEE Communications Magazine, vol. 49, no. 4, pp. 28-35, 2011.
    • (2011) IEEE Communications Magazine , vol.49 , Issue.4 , pp. 28-35
    • Lu, R.1    Li, X.2    Liang, X.3    Shen, X.4    Lin, X.5
  • 22
    • 33645091897 scopus 로고    scopus 로고
    • Sizzle: A standards-based end-to-end security architecture for the embedded Internet
    • V. Gupta, M. Wurm, Y. Zhu et al., "Sizzle: a standards-based end-to-end security architecture for the embedded Internet", Pervasive and Mobile Computing, vol. 1, no. 4, pp. 425-445, 2005.
    • (2005) Pervasive and Mobile Computing , vol.1 , Issue.4 , pp. 425-445
    • Gupta, V.1    Wurm, M.2    Zhu, Y.3
  • 24
    • 74549125519 scopus 로고    scopus 로고
    • An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
    • X. H. Le, S. Lee, I. Butun et al., "An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography", Journal of Communications and Networks, vol. 11, no. 6, pp. 599-606, 2009.
    • (2009) Journal of Communications and Networks , vol.11 , Issue.6 , pp. 599-606
    • Le, X.H.1    Lee, S.2    Butun, I.3
  • 25
    • 69949155644 scopus 로고    scopus 로고
    • An efficient sensor-tosensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
    • C. T. Li, M. S. Hwang, and Y. P. Chu, "An efficient sensor-tosensor authenticated path-key establishment scheme for secure communications in wireless sensor networks", International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, 2009.
    • (2009) International Journal of Innovative Computing, Information and Control , vol.5 , Issue.8 , pp. 2107-2124
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 29
    • 84934966150 scopus 로고    scopus 로고
    • Tech. Rep., Crossbow Inc.
    • "Telos B Datasheet", Tech. Rep., Crossbow Inc., 2013, http://www.datasheetarchive.com/4. Crossbow.-datasheet.html.
    • (2013) Telos B Datasheet
  • 32
    • 84866951209 scopus 로고    scopus 로고
    • Node capture attack detection and defence inwireless sensor networks
    • S. H. Jokhio, I. A. Jokhio, and A. H. Kemp, "Node capture attack detection and defence inwireless sensor networks", IETWireless Sensor Systems, vol. 2, no. 3, pp. 161-169, 2012.
    • (2012) IETWireless Sensor Systems , vol.2 , Issue.3 , pp. 161-169
    • Jokhio, S.H.1    Jokhio, I.A.2    Kemp, A.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.