메뉴 건너뛰기




Volumn 417, Issue , 2013, Pages 63-79

Defensive rekeying strategies for physical-layer-monitored low-rate wireless personal area networks

Author keywords

Cyber physical systems; RF fingerprinting; Security; ZigBee networks

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CRITICAL INFRASTRUCTURES; CYBER PHYSICAL SYSTEM; DENIAL-OF-SERVICE ATTACK; EMBEDDED SYSTEMS; NETWORK LAYERS; NETWORK SECURITY; PERSONAL COMMUNICATION SYSTEMS; PUBLIC WORKS; RADIO TRANSCEIVERS; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 84993936186     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-45330-4_5     Document Type: Conference Paper
Times cited : (6)

References (27)
  • 2
    • 84868383474 scopus 로고    scopus 로고
    • Industrial-strength security for ZigBee: The case for public-key cryptography
    • M. Blaser, Industrial-strength security for ZigBee: The case for public-key cryptography, Embedded Computing Design, May 13, 2005.
    • (2005) Embedded Computing Design, May , vol.13
    • Blaser, M.1
  • 20
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • E. Shi and A. Perrig, Designing secure sensor networks, IEEE Wireless Communications, vol. 11(6), pp. 38–43, 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 22
    • 37549056155 scopus 로고    scopus 로고
    • Hierarchical group access control for secure multicast communications
    • Y. Sun and K. Liu, Hierarchical group access control for secure multicast communications, IEEE/ACM Transactions on Networking, vol. 15(6), pp. 1514–1526, 2007.
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.6 , pp. 1514-1526
    • Sun, Y.1    Liu, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.