메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1-207

Security for wireless sensor networks using identity-based cryptography

Author keywords

[No Author keywords available]

Indexed keywords

ENERGY EFFICIENCY; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84938362699     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Book
Times cited : (20)

References (180)
  • 4
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: Evolution, opportunities, and challenges
    • Chee-Yee, Chong, and S. P. Kumar. Sensor networks: Evolution, opportunities, and challenges. Proceedings of the IEEE 91, no. 8 (2003): 1247–1256.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chee-Yee, C.1    Kumar, S.P.2
  • 8
    • 85039444848 scopus 로고    scopus 로고
    • Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications
    • IEEE Std. 802.15.4—2003: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE, 2003.
    • (2003) IEEE
  • 10
    • 51849104106 scopus 로고    scopus 로고
    • Undersea wireless sensor network for ocean pollution prevention. Proceedings of 3rd International Conference on Communication Systems Software and Middleware and Workshops
    • Khan, A., and L. Jenkins. Undersea wireless sensor network for ocean pollution prevention. Proceedings of 3rd International Conference on Communication Systems Software and Middleware and Workshops. IEEE, 2008, 2–8.
    • (2008) IEEE , pp. 2-8
    • Khan, A.1    Jenkins, L.2
  • 16
  • 24
    • 0024612211 scopus 로고
    • Mach: A system software kernel. 34th Computer Society International Conference (COMPCON)
    • Rashid, R., et al. Mach: A system software kernel. 34th Computer Society International Conference (COMPCON). IEEE, 1989, 176–178.
    • (1989) IEEE , pp. 176-178
    • Rashid, R.1
  • 26
    • 3242765057 scopus 로고    scopus 로고
    • Data mules: Modeling and analysis of a threetier architecture for sparse sensor networks
    • Shah, R., S. Roy, S. Jain, and W. Brunette. Data mules: Modeling and analysis of a threetier architecture for sparse sensor networks. Ad Hoc Networks (Elsevier) 1, no. 2–3 (2003): 215–233.
    • (2003) Ad Hoc Networks (Elsevier) , vol.1 , Issue.2-3 , pp. 215-233
    • Shah, R.1    Roy, S.2    Jain, S.3    Brunette, W.4
  • 32
    • 65249128049 scopus 로고    scopus 로고
    • Security for wireless sensor networks: A review. SAS 2009— IEEE Sensors Applications Symposium
    • Healy, M., T. Newe, and E. Lewis. Security for wireless sensor networks: A review. SAS 2009— IEEE Sensors Applications Symposium. IEEE, 2009, 80–85.
    • (2009) IEEE , pp. 80-85
    • Healy, M.1    Newe, T.2    Lewis, E.3
  • 40
    • 51849119602 scopus 로고    scopus 로고
    • Defending wireless sensor networks from radio interference through channel adaptation
    • August
    • Xu, W., W. Trappe, and Y. Zhang. Defending wireless sensor networks from radio interference through channel adaptation. ACM Transactions on Sensor Networks, 4, no. 4 (August 2008).
    • (2008) ACM Transactions on Sensor Networks , vol.4 , Issue.4
    • Xu, W.1    Trappe, W.2    Zhang, Y.3
  • 47
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory (IEEE) 31, no. 4 (1984): 469–472.
    • (1984) IEEE Transactions on Information Theory (IEEE) , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 48
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie–Hellman
    • Springer-Verlag
    • Joux, A. A one round protocol for tripartite Diffie–Hellman. Lecture Notes in Computer Science (Springer-Verlag) 1838 (2000): 385–394.
    • (2000) Lecture Notes in Computer Science , vol.1838 , pp. 385-394
    • Joux, A.1
  • 49
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N. Elliptic curve cryptosystems. Mathematics of Computation 48, no. 177 (1987): 203–209.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 50
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • Lenstra, H. W. Factoring integers with elliptic curves. Annals of Mathematics 126, no. 3 (1987): 649–673.
    • (1987) Annals of Mathematics , vol.126 , Issue.3 , pp. 649-673
    • Lenstra, H.W.1
  • 52
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM (ACM) 21, no. 2 (1978): 120–126.
    • (1978) Communications of the ACM (ACM) , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 57
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • (Springer-Verlag) 3027
    • Boneh, D., and X. Boyen. Efficient selective-ID secure identity-based encryption without random oracles. Lecture Notes in Computer Science (Springer-Verlag) 3027 (2004): 223–238.
    • (2004) Lecture Notes in Computer Science , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 61
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues. Cryptography and in Coding—Institute of Mathematics and Its Applications International Conference on Cryptography and Coding—Proceedings of IMA 2001
    • Cocks, C. An identity based encryption scheme based on quadratic residues. Cryptography and in Coding—Institute of Mathematics and Its Applications International Conference on Cryptography and Coding—Proceedings of IMA 2001, LNCS (Springer-Verlag) 2260 (2001): 360–363.
    • (2001) LNCS (Springer-Verlag) , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 63
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Elgamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. Transactions on Information Theory 31, no. 4 (1985): 469–472.
    • (1985) Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 70
    • 84947597805 scopus 로고
    • Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
    • Maurer, U. M. Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms. Lecture Notes in Computer Science (Springer) 839 (1994): 271–281.
    • (1994) Lecture Notes in Computer Science (Springer) , vol.839 , pp. 271-281
    • Maurer, U.M.1
  • 72
    • 0017930809 scopus 로고
    • A method of obtaining digital signatures and public-key cryptosystems
    • Rivest, R., A. Shamir, and L. Adleman. A method of obtaining digital signatures and public-key cryptosystems. Communications (ACM) 21, no. 2 (1978): 120–126.
    • (1978) Communications (ACM) , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 74
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes. Advances in Cryptology
    • Shamir, A. Identity-based cryptosystems and signature schemes. Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science (Springer-Verlag) 196 (1984): 47–53.
    • (1984) Proceedings of CRYPTO 84, Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 79
    • 39049094066 scopus 로고    scopus 로고
    • IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
    • Cao, X., W. Kou, L. Dang, and B. Zhao. IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer Communication (Elsevier) 31 (2008): 659–667.
    • (2008) Computer Communication (Elsevier) , vol.31 , pp. 659-667
    • Cao, X.1    Kou, W.2    Dang, L.3    Zhao, B.4
  • 92
    • 12344258539 scopus 로고
    • Efficient signature generation for smart card
    • Schnorr, C. P. Efficient signature generation for smart card. Journal of Crytology 4, no. 3 (1991): 161–174.
    • (1991) Journal of Crytology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 93
    • 28244469017 scopus 로고    scopus 로고
    • Analysis and improvement of an authenticated key exchange protocol for sensor networks
    • Tian, X., D. Wong, and R. Zhu. Analysis and improvement of an authenticated key exchange protocol for sensor networks. Communications Letters (IEEE) 9, no. 11 (2005): 970–972.
    • (2005) Communications Letters (IEEE) , vol.9 , Issue.11 , pp. 970-972
    • Tian, X.1    Wong, D.2    Zhu, R.3
  • 96
  • 101
    • 34247221952 scopus 로고    scopus 로고
    • Combinatorial design of key distribution mechanisms for wireless sensor networks
    • Camtepe, S., and B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE Transactions on Networking (IEEE) 15, no. 2 (2007): 346–358.
    • (2007) IEEE Transactions on Networking (IEEE) , vol.15 , Issue.2 , pp. 346-358
    • Camtepe, S.1    Yener, B.2
  • 106
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman. Proceedings of Algorithmic Number Theory Symposium – ANTS IV
    • Joux A. A one round protocol for tripartite Diffie-Hellman. Proceedings of Algorithmic Number Theory Symposium – ANTS IV, Lecture Notes in Computer Science (Springer-Verlag) 1838 (2000): 385–394.
    • (2000) Lecture Notes in Computer Science (Springer-Verlag) , vol.1838 , pp. 385-394
    • Joux, A.1
  • 107
    • 24144503356 scopus 로고    scopus 로고
    • Deterministic key predistribution schemes for distributed sensor networks
    • Lee, J., and D. Stinson. Deterministic key predistribution schemes for distributed sensor networks. Lecture Notes in Computer Science (Springer-Verlag) 3357 (2005): 294–307.
    • (2005) Lecture Notes in Computer Science (Springer-Verlag) , vol.3357 , pp. 294-307
    • Lee, J.1    Stinson, D.2
  • 115
    • 11144277843 scopus 로고    scopus 로고
    • Routing techniques in wireless sensor networks: A survey
    • Al-Karaki, J. N., and A. E. Kamal. Routing techniques in wireless sensor networks: A survey. Wireless Communications (IEEE) 11 (2004): 6–28.
    • (2004) Wireless Communications (IEEE) , vol.11 , pp. 6-28
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 119
    • 46749106785 scopus 로고    scopus 로고
    • Security and performance analysis of a secure clustering protocol for sensor networks
    • Banerjee, P., D. Jacobson, and S. N. Lahiri. Security and performance analysis of a secure clustering protocol for sensor networks. Network Computing and Application (IEEE), 2007, 145–152.
    • (2007) Network Computing and Application (IEEE) , pp. 145-152
    • Banerjee, P.1    Jacobson, D.2    Lahiri, S.N.3
  • 120
    • 35048874134 scopus 로고    scopus 로고
    • ACE: An emergent algorithm for highly uniform cluster formation
    • Chan, H., and A. Perrig. ACE: An emergent algorithm for highly uniform cluster formation. Lecture Notes in Computer Science (Springer) 2920 (2004): 154–171.
    • (2004) Lecture Notes in Computer Science (Springer) , vol.2920 , pp. 154-171
    • Chan, H.1    Perrig, A.2
  • 122
    • 0035415758 scopus 로고    scopus 로고
    • The performance of query control scheme for the zone routing protocol
    • Haas, Z., and M. Pearlman. The performance of query control scheme for the zone routing protocol. Transactions on Networking (IEEE), 2001, 427–438.
    • (2001) Transactions on Networking (IEEE) , pp. 427-438
    • Haas, Z.1    Pearlman, M.2
  • 125
    • 84943807207 scopus 로고    scopus 로고
    • Towards secure key distribution in truly ad-hoc network. Symposium on Applications and the Internet Workshops
    • Khalili, A., J. Katz, and A. Arbaugh. Towards secure key distribution in truly ad-hoc network. Symposium on Applications and the Internet Workshops. IEEE, 2003, 342–346.
    • (2003) IEEE , pp. 342-346
    • Khalili, A.1    Katz, J.2    Arbaugh, A.3
  • 126
    • 70449525340 scopus 로고    scopus 로고
    • Detecting Sybil attacks in wireless sensor networks using neighboring information
    • December
    • Kuo-Feng, S., W. Wei-Tong, and C. Wen-Chung. Detecting Sybil attacks in wireless sensor networks using neighboring information. Computer Networks (Elsevier) 53, no. 18 (December 2009): 3042–3056.
    • (2009) Computer Networks (Elsevier) , vol.53 , Issue.18 , pp. 3042-3056
    • Kuo-Feng, S.1    Wei-Tong, W.2    Wen-Chung, C.3
  • 128
    • 85055373056 scopus 로고    scopus 로고
    • A secure routing protocol for cluster-based wireless sensor networks using id-based digital signature
    • Lu, H., J. Li, and H. Kameda. A secure routing protocol for cluster-based wireless sensor networks using id-based digital signature. Global Telecommunications Conference. IEEE, 2010, 1–5.
    • (2010) Global Telecommunications Conference. IEEE , pp. 1-5
    • Lu, H.1    Li, J.2    Kameda, H.3
  • 130
  • 134
    • 85031307530 scopus 로고
    • Highly dynamic destination sequenced distance-vector routing for mobile computers
    • Perkins, C., and P. Bhagwat. Highly dynamic destination sequenced distance-vector routing for mobile computers. ACM’s Computer Communication Review (ACM), 1994, 234–244.
    • (1994) ACM’s Computer Communication Review (ACM) , pp. 234-244
    • Perkins, C.1    Bhagwat, P.2
  • 140
    • 25844505160 scopus 로고    scopus 로고
    • Exploiting Heterogeneity in Sensor Networks. 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • Yarvis, M., N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh. Exploiting Heterogeneity in Sensor Networks. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, 2005, 878–890.
    • (2005) IEEE , pp. 878-890
    • Yarvis, M.1    Kushalnagar, N.2    Singh, H.3    Rangarajan, A.4    Liu, Y.5    Singh, S.6
  • 141
    • 34548825399 scopus 로고    scopus 로고
    • PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks
    • Yia, S., J. Heo, Y. Cho, and J. Hong. PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks. Computer Communications (Elsevier) 30, no. 14–15 (2007): 2842–2852.
    • (2007) Computer Communications (Elsevier) , vol.30 , Issue.14-15 , pp. 2842-2852
    • Yia, S.1    Heo, J.2    Cho, Y.3    Hong, J.4
  • 142
    • 0003405130 scopus 로고    scopus 로고
    • Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Tech Report
    • Yu, Y., R. Govindan, and D. Estrin. Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Tech Report, UCLA, 2001.
    • (2001) UCLA
    • Yu, Y.1    Govindan, R.2    Estrin, D.3
  • 143
    • 2342537739 scopus 로고    scopus 로고
    • Joint scheduling and power control for wireless ad hoc networks
    • ElBatt, T., and A. Ephremides. Joint scheduling and power control for wireless ad hoc networks. IEEE Transactions on Wireless Communications 3, no. 1 (2004): 74–85.
    • (2004) IEEE Transactions on Wireless Communications , vol.3 , Issue.1 , pp. 74-85
    • Elbatt, T.1    Ephremides, A.2
  • 144
    • 0002348257 scopus 로고
    • TCP and explicit congestion notification
    • Floyd, S. TCP and explicit congestion notification. SIGCOMM Computer Communication Review 24, no. 5 (1994): 8–23.
    • (1994) SIGCOMM Computer Communication Review , vol.24 , Issue.5 , pp. 8-23
    • Floyd, S.1
  • 145
    • 33847047632 scopus 로고    scopus 로고
    • Hints and notifications. Wireless Communications and Networking Conference
    • Larzon, L.-A., U. Bodin, and O. Schelen. Hints and notifications. Wireless Communications and Networking Conference. IEEE, 2002, 635–641.
    • (2002) IEEE , pp. 635-641
    • Larzon, L.-A.1    Bodin, U.2    Schelen, O.3
  • 154
    • 85055379582 scopus 로고    scopus 로고
    • Standards for efficient cryptography – SEC 2: Recommended elliptic curve domain parameters
    • Certicom. Standards for efficient cryptography – SEC 2: Recommended elliptic curve domain parameters. Certicom, 2000.
    • (2000) Certicom
    • Certicom1
  • 155
    • 10444273896 scopus 로고
    • Exponentiation cryptosystems on the IBM PC
    • Comba, P. Exponentiation cryptosystems on the IBM PC. IBM System (1990): 526–538.
    • (1990) IBM System , pp. 526-538
    • Comba, P.1
  • 163
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. 7th International Conference on Information Processing in Sensor Networks
    • Liu, A., and P. Ping. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. 7th International Conference on Information Processing in Sensor Networks. IEEE, 2008, 245–256.
    • (2008) IEEE , pp. 245-256
    • Liu, A.1    Ping, P.2
  • 168
    • 84966243285 scopus 로고
    • Modular multiplication without division
    • American Mathematical Society
    • Montgomery, P. Modular multiplication without division. Mathematics of Computation (American Mathematical Society) 44 (1985): 519–521.
    • (1985) Mathematics of Computation , vol.44 , pp. 519-521
    • Montgomery, P.1
  • 169
    • 0013145165 scopus 로고    scopus 로고
    • National Institute of Standards and Technology
    • NIST. Recommended elliptic curves for Federal government use. National Institute of Standards and Technology, 1999. http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.doc
    • (1999) Recommended Elliptic Curves for Federal Government Use
  • 171
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(P) and its cryptographic significance. Edited by IEEE. Transactions on Information
    • Pohlig, S., and M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. Edited by IEEE. Transactions on Information Theory 24 (1978): 106–110.
    • (1978) Theory , vol.24 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 173
    • 68149165367 scopus 로고    scopus 로고
    • TinyECCK: Efficient elliptic curve cryptography implementation over G(2) on 8-bit MICAz mote
    • Seo, S. C., D. Han, and S. Hong. TinyECCK: Efficient elliptic curve cryptography implementation over G(2) on 8-bit MICAz mote. IEICE Transactions. IEICE, 2008.
    • (2008) IEICE Transactions. IEICE
    • Seo, S.C.1    Han, D.2    Hong, S.3
  • 176
    • 49949100301 scopus 로고    scopus 로고
    • NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. European Conference on Wireless Sensor Networks
    • Szczechowiak, P, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab. NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. European Conference on Wireless Sensor Networks, Lecture Notes in Computer Science. Springer, 2008, 305–320.
    • (2008) Lecture Notes in Computer Science , pp. 305-320
    • Szczechowiak, P.1    Oliveira, L.B.2    Scott, M.3    Collier, M.4    Dahab, R.5
  • 178
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography based access control in sensor networks
    • Wang, H., B. Sheng, and Q. Li. Elliptic curve cryptography based access control in sensor networks. International Journal of Security and Networks 1 (2006): 127–137.
    • (2006) International Journal of Security and Networks , vol.1 , pp. 127-137
    • Wang, H.1    Sheng, B.2    Li, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.