메뉴 건너뛰기




Volumn 3, Issue , 2015, Pages 875-889

A PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs

Author keywords

6LoWPAN; Intra node communication; Protocol analyzer; Public key infrastructure; Secured communication in sensor network

Indexed keywords

AUTOMATION; COMMUNICATION CHANNELS (INFORMATION THEORY); CONDITION MONITORING; DATA TRANSFER; GATEWAYS (COMPUTER NETWORKS); INFORMATION DISSEMINATION; LOW POWER ELECTRONICS; MILITARY APPLICATIONS; MILITARY OPERATIONS; PERSONAL COMMUNICATION SYSTEMS; PROCESS CONTROL; PUBLIC KEY CRYPTOGRAPHY; ROUTERS; SATELLITE LINKS; SENSOR NODES; TELECOMMUNICATION NETWORKS; WIRELESS SENSOR NETWORKS;

EID: 84961079547     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2015.2445817     Document Type: Article
Times cited : (15)

References (41)
  • 5
  • 6
    • 47649094244 scopus 로고    scopus 로고
    • Extending IP to low-power, wireless personal area networks
    • Jul./Aug.
    • J. W. Hui and D. E. Culler, "Extending IP to low-power, wireless personal area networks," IEEE Internet Comput., vol. 12, no. 4, pp. 37-45, Jul./Aug. 2008.
    • (2008) IEEE Internet Comput. , vol.12 , Issue.4 , pp. 37-45
    • Hui, J.W.1    Culler, D.E.2
  • 8
    • 77958150762 scopus 로고    scopus 로고
    • IPv6 in low-power wireless networks
    • Nov.
    • J. W. Hui and D. E. Culler, "IPv6 in low-power wireless networks," Proc. IEEE, vol. 98, no. 11, pp. 1865-1878, Nov. 2010.
    • (2010) Proc. IEEE , vol.98 , Issue.11 , pp. 1865-1878
    • Hui, J.W.1    Culler, D.E.2
  • 9
    • 34247606829 scopus 로고    scopus 로고
    • Efficient hybrid security mechanisms for heterogeneous sensor networks
    • Jun.
    • P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta, "Efficient hybrid security mechanisms for heterogeneous sensor networks," IEEE Trans. Mobile Comput., vol. 6, no. 6, pp. 663-677, Jun. 2007.
    • (2007) IEEE Trans. Mobile Comput. , vol.6 , Issue.6 , pp. 663-677
    • Traynor, P.1    Kumar, R.2    Choi, H.3    Cao, G.4    Zhu, S.5    La Porta, T.6
  • 10
    • 32844459414 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • Jan.
    • W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," IEEE Trans. Dependable Secure Comput., vol. 3, no. 1, pp. 62-77, Jan. 2006.
    • (2006) IEEE Trans. Dependable Secure Comput. , vol.3 , Issue.1 , pp. 62-77
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 12
    • 77954886398 scopus 로고    scopus 로고
    • Geographic server distribution model for key revocation
    • Aug.
    • S. Misra, S. Goswami, G. P. Pathak, N. Shah, and I. Woungang, "Geographic server distribution model for key revocation," Telecommun. Syst., vol. 44, nos. 3-4, pp. 281-295, Aug. 2010.
    • (2010) Telecommun. Syst. , vol.44 , Issue.3-4 , pp. 281-295
    • Misra, S.1    Goswami, S.2    Pathak, G.P.3    Shah, N.4    Woungang, I.5
  • 15
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Oakland, CA, USA, May
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Secur. Privacy, Oakland, CA, USA, May 2003, pp. 197-213.
    • (2003) Proc. IEEE Symp. Secur. Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 16
    • 78751641700 scopus 로고    scopus 로고
    • Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks
    • Feb.
    • S. Misra, S. Goswami, G. P. Pathak, and N. Shah, "Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks," Wireless Commun. Mobile Comput., vol. 11, no. 2, pp. 146-162, Feb. 2011.
    • (2011) Wireless Commun. Mobile Comput. , vol.11 , Issue.2 , pp. 146-162
    • Misra, S.1    Goswami, S.2    Pathak, G.P.3    Shah, N.4
  • 17
    • 84896469488 scopus 로고    scopus 로고
    • Certification authorities under attack: A plea for certificate legitimation
    • Jan./Feb.
    • R. Oppliger, "Certification authorities under attack: A plea for certificate legitimation," IEEE Internet Comput., vol. 18, no. 1, pp. 40-47, Jan./Feb. 2014.
    • (2014) IEEE Internet Comput. , vol.18 , Issue.1 , pp. 40-47
    • Oppliger, R.1
  • 24
    • 84959275167 scopus 로고    scopus 로고
    • Optimization of public key cryptography (RSA and ECC) for 16-bits devices based on 6LoWPAN
    • Tokyo, Japan
    • J. Ayuso, L. Marin, A. J. Jara, and A. F. G. Skarmeta, "Optimization of public key cryptography (RSA and ECC) for 16-bits devices based on 6LoWPAN," in Proc. 1st Int. Workshop Secur. Internet Things, Tokyo, Japan, 2010, pp. 1-8.
    • (2010) Proc. 1st Int. Workshop Secur. Internet Things , pp. 1-8
    • Ayuso, J.1    Marin, L.2    Jara, A.J.3    Skarmeta, A.F.G.4
  • 25
    • 84893874337 scopus 로고    scopus 로고
    • An enhanced public key infrastructure to secure smart grid wireless communication networks
    • Jan./Feb.
    • D. He, S. Chan, Y. Zhang, M. Guizani, C. Chen, and J. Bu, "An enhanced public key infrastructure to secure smart grid wireless communication networks," IEEE Netw., vol. 28, no. 1, pp. 10-16, Jan./Feb. 2014.
    • (2014) IEEE Netw. , vol.28 , Issue.1 , pp. 10-16
    • He, D.1    Chan, S.2    Zhang, Y.3    Guizani, M.4    Chen, C.5    Bu, J.6
  • 26
    • 84880570801 scopus 로고    scopus 로고
    • Efficient signcryption for heterogeneous systems
    • Sep.
    • F. Li, H. Zhang, and T. Takagi, "Efficient signcryption for heterogeneous systems," IEEE Syst. J., vol. 7, no. 3, pp. 420-429, Sep. 2013.
    • (2013) IEEE Syst. J. , vol.7 , Issue.3 , pp. 420-429
    • Li, F.1    Zhang, H.2    Takagi, T.3
  • 27
    • 56949106654 scopus 로고    scopus 로고
    • A unified security framework with three key management schemes for wireless sensor networks
    • Dec.
    • R. Riaz, A. Naureen, A. Akram, A. H. Akbar, K.-H. Kim, and H. F. Ahmed, "A unified security framework with three key management schemes for wireless sensor networks," Comput. Commun., vol. 31, no. 18, pp. 4269-4280, Dec. 2008.
    • (2008) Comput. Commun. , vol.31 , Issue.18 , pp. 4269-4280
    • Riaz, R.1    Naureen, A.2    Akram, A.3    Akbar, A.H.4    Kim, K.-H.5    Ahmed, H.F.6
  • 28
    • 84892410398 scopus 로고    scopus 로고
    • Privacy-preserving authenticated key-exchange over Internet
    • Jan.
    • A. C.-C. Yao and Y. Zhao, "Privacy-preserving authenticated key-exchange over Internet," IEEE Trans. Inf. Forensics Security, vol. 9, no. 1, pp. 125-140, Jan. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.1 , pp. 125-140
    • Yao, A.C.-C.1    Zhao, Y.2
  • 30
    • 84870429369 scopus 로고    scopus 로고
    • EMAP: Expedite message authentication protocol for vehicular ad hoc networks
    • Jan.
    • A. Wasef and X. Shen, "EMAP: Expedite message authentication protocol for vehicular ad hoc networks," IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 78-89, Jan. 2013.
    • (2013) IEEE Trans. Mobile Comput. , vol.12 , Issue.1 , pp. 78-89
    • Wasef, A.1    Shen, X.2
  • 32
    • 84875051385 scopus 로고    scopus 로고
    • A highly scalable key pre-distribution scheme for wireless sensor networks
    • Feb.
    • W. Bechkit, Y. Challal, A. Bouabdallah, and V. Tarokh, "A highly scalable key pre-distribution scheme for wireless sensor networks," IEEE Trans. Wireless Commun., vol. 12, no. 2, pp. 948-959, Feb. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.2 , pp. 948-959
    • Bechkit, W.1    Challal, Y.2    Bouabdallah, A.3    Tarokh, V.4
  • 33
    • 77952925515 scopus 로고    scopus 로고
    • Key predistribution approach in wireless sensor networks using LU matrix
    • Aug.
    • H. Dai and H. Xu, "Key predistribution approach in wireless sensor networks using LU matrix," IEEE Sensors J., vol. 10, no. 8, pp. 1399-1409, Aug. 2010.
    • (2010) IEEE Sensors J. , vol.10 , Issue.8 , pp. 1399-1409
    • Dai, H.1    Xu, H.2
  • 34
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • Washington, DC, USA
    • L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. 9th ACM Conf. Comput. Commun. Secur., Washington, DC, USA, 2012, pp. 41-47.
    • (2012) Proc. 9th ACM Conf. Comput. Commun. Secur. , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 35
    • 84903767555 scopus 로고    scopus 로고
    • A novel approach to trust management in unattended wireless sensor networks
    • Jul.
    • Y. Ren, V. I. Zadorozhny, V. A. Oleshchuk, and F. Y. Li, "A novel approach to trust management in unattended wireless sensor networks," IEEE Trans. Mobile Comput., vol. 13, no. 7, pp. 1409-1423, Jul. 2014.
    • (2014) IEEE Trans. Mobile Comput. , vol.13 , Issue.7 , pp. 1409-1423
    • Ren, Y.1    Zadorozhny, V.I.2    Oleshchuk, V.A.3    Li, F.Y.4
  • 36
    • 77953552937 scopus 로고    scopus 로고
    • Cooperative communications based on trust model for mobile ad hoc networks
    • Jun.
    • K. Wang and M. Wu, "Cooperative communications based on trust model for mobile ad hoc networks," IET Inf. Secur., vol. 4, no. 2, pp. 68-79, Jun. 2010.
    • (2010) IET Inf. Secur. , vol.4 , Issue.2 , pp. 68-79
    • Wang, K.1    Wu, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.