메뉴 건너뛰기




Volumn , Issue , 2015, Pages 249-260

A secure communication protocol for drones and smart objects

Author keywords

Certificateless Signcryption; Drone Communications

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; SECURE COMMUNICATION;

EID: 84942540442     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2714576.2714616     Document Type: Conference Paper
Times cited : (84)

References (29)
  • 1
    • 84942548166 scopus 로고    scopus 로고
    • Low power listening
    • Low power listening, http://tinyos.stanford.edu/tinyos-wiki/index.php/writing low-power applications.
  • 2
    • 84942548167 scopus 로고    scopus 로고
    • Parrot
    • Parrot, http://ardrone2.parrot.com.
  • 3
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • C.-S. Laih, editor, Springer
    • S. Al-Riyami and K. Paterson. Certificateless public key cryptography. In C.-S. Laih, editor, ASIACRYPT, volume 2894 of LNCS, pages 452-473. Springer, 2003.
    • (2003) ASIACRYPT, Volume 2894 of LNCS , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.2
  • 4
    • 47749097108 scopus 로고    scopus 로고
    • An adaptive data-transfer protocol for sensor networks with data mules
    • G. Anastasi, M. Conti, E. Monaldi, and A. Passarella. An adaptive data-transfer protocol for sensor networks with data mules. In WoWMoM, pages 1-8, 2007.
    • (2007) WoWMoM , pp. 1-8
    • Anastasi, G.1    Conti, M.2    Monaldi, E.3    Passarella, A.4
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Springer
    • D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In Proceedings of CRYPTO '01, pages 213-229. Springer, 2001.
    • (2001) Proceedings of CRYPTO'01 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 8
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks
    • W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In CCS '03. Proceedings, 2003.
    • (2003) CCS '03. Proceedings
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 9
    • 77949302373 scopus 로고    scopus 로고
    • Provably secure certificateless two-party authenticated key agreement protocol without pairing
    • M. Geng and F. Zhang. Provably secure certificateless two-party authenticated key agreement protocol without pairing. In CIS '09, pages 208-212, 2009.
    • (2009) CIS'09 , pp. 208-212
    • Geng, M.1    Zhang, F.2
  • 10
    • 80052632132 scopus 로고    scopus 로고
    • A pairing-free certificateless authenticated key agreement protocol
    • D. He, J. Chen, and J. Hu. A pairing-free certificateless authenticated key agreement protocol. Int. Journal of Comm. Sys., pages 221-230, 2012.
    • (2012) Int. Journal of Comm. Sys. , pp. 221-230
    • He, D.1    Chen, J.2    Hu, J.3
  • 13
    • 51249087814 scopus 로고    scopus 로고
    • Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
    • April
    • A. Liu and P. Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In IPSN '08, pages 245-256, April 2008.
    • (2008) IPSN'08 , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 14
    • 84942548171 scopus 로고    scopus 로고
    • K. MacKay. https://github.com/kmackay/micro-ecc.
    • MacKay, K.1
  • 15
    • 77957230388 scopus 로고    scopus 로고
    • Private key agreement and secure communication for heterogeneous sensor networks
    • Aug.
    • S. M. Mizanur Rahman and K. El-Khatib. Private key agreement and secure communication for heterogeneous sensor networks. J. Parallel Distrib. Comput., 70(8):858-870, Aug. 2010.
    • (2010) J. Parallel Distrib. Comput. , vol.70 , Issue.8 , pp. 858-870
    • Mizanur Rahman, S.M.1    El-Khatib, K.2
  • 16
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. JOURNAL OF CRYPTOLOGY, 13:361-396, 2000.
    • (2000) Journal of Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 18
    • 84942548172 scopus 로고    scopus 로고
    • Secure data collection scheme in wireless sensor network with mobile sink
    • A. Rasheed and R. Mahapatra. Secure data collection scheme in wireless sensor network with mobile sink. In IEEE NCA '08, 2008.
    • (2008) IEEE NCA '08
    • Rasheed, A.1    Mahapatra, R.2
  • 21
    • 84942548173 scopus 로고    scopus 로고
    • Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing
    • S. Seo and E. Bertino. Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing, http://www.cerias.purdue.edu/apps/reports and papers/view/4698. CERIAS report, '13.
    • CERIAS report,'13
    • Seo, S.1    Bertino, E.2
  • 22
    • 84942436269 scopus 로고    scopus 로고
    • Data mules: Modeling a three-tier architecture for sparse sensor networks
    • R. Shah, S. Roy, S. Jain, and W. Brunette. Data mules: modeling a three-tier architecture for sparse sensor networks. In SNPA '03, Proceedings, 2003.
    • (2003) SNPA '03, Proceedings
    • Shah, R.1    Roy, S.2    Jain, S.3    Brunette, W.4
  • 23
    • 51849099823 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks
    • Sept.
    • H. Song, S. Zhu, W. Zhang, and G. Cao. Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. ACM Trans. Sen. Netw., 4(4):23:1-23:34, Sept. 2008.
    • (2008) ACM Trans. Sen. Netw. , vol.4 , Issue.4 , pp. 231-2334
    • Song, H.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 24
    • 84880802438 scopus 로고    scopus 로고
    • A novel pairing-free certificateless authenticated key agreement protocol with provable security
    • H. Sun, Q. Wen, H. Zhang, and Z. Jin. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Frontiers of Computer Science, 7(4):544-557, 2013.
    • (2013) Frontiers of Computer Science , vol.7 , Issue.4 , pp. 544-557
    • Sun, H.1    Wen, Q.2    Zhang, H.3    Jin, Z.4
  • 25
    • 17444417505 scopus 로고    scopus 로고
    • Eficient collection of sensor data in remoteélds using mobile collectors
    • Y. Tirta, Z. Li, Y.-H. Lu, and S. Bagchi. Eficient collection of sensor data in remoteélds using mobile collectors. In ICCCN '04. Proceedings, 2004.
    • (2004) ICCCN '04. Proceedings
    • Tirta, Y.1    Li, Z.2    Lu, Y.-H.3    Bagchi, S.4
  • 26
    • 79956037223 scopus 로고    scopus 로고
    • Strongly secure certificateless key exchange without pairing
    • G. Yang and C.-H. Tan. Strongly secure certificateless key exchange without pairing. In ASIACCS, 2011.
    • (2011) ASIACCS
    • Yang, G.1    Tan, C.-H.2
  • 28
    • 4444277059 scopus 로고    scopus 로고
    • A message ferrying approach for data delivery in sparse mobile ad hoc networks
    • W. Zhao, M. Ammar, and E. Zegura. A message ferrying approach for data delivery in sparse mobile ad hoc networks. In ACM MobiHoc, pages 187-198, 2004.
    • (2004) ACM MobiHoc , pp. 187-198
    • Zhao, W.1    Ammar, M.2    Zegura, E.3
  • 29
    • 39049087772 scopus 로고    scopus 로고
    • Supporting secure communication and data collection in mobile sensor networks
    • L. Zhou, J. Ni, and C. Ravishankar. Supporting secure communication and data collection in mobile sensor networks. In INFOCOM '06. Proceedings, 2006.
    • (2006) INFOCOM '06. Proceedings
    • Zhou, L.1    Ni, J.2    Ravishankar, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.