메뉴 건너뛰기




Volumn 2016, Issue , 2016, Pages

A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; ENERGY UTILIZATION; SENSOR NODES;

EID: 84994229624     PISSN: 1687725X     EISSN: 16877268     Source Type: Journal    
DOI: 10.1155/2016/1547963     Document Type: Article
Times cited : (13)

References (20)
  • 2
    • 84939793628 scopus 로고    scopus 로고
    • Trust-aware and low energy consumption security topology protocol of wireless sensor network
    • Z. Chen, M. He, W. Liang, and K. Chen, "Trust-aware and low energy consumption security topology protocol of wireless sensor network," Journal of Sensors, vol. 2015,Article ID716468, 10 pages, 2015.
    • (2015) Journal of Sensors , vol.2015
    • Chen, Z.1    He, M.2    Liang, W.3    Chen, K.4
  • 3
    • 84930432851 scopus 로고    scopus 로고
    • Key pre-distribution scheme forWSNs
    • S. Verma and Prachi, "Key pre-distribution scheme forWSNs," Ad-Hoc and SensorWireless Networks, vol. 23, no. 1-2, pp. 47-67, 2014.
    • (2014) Ad-Hoc and SensorWireless Networks , vol.23 , Issue.1-2 , pp. 47-67
    • Verma, S.1    Prachi2
  • 4
    • 84930068210 scopus 로고    scopus 로고
    • A new key predistribution scheme for grid-group deployment of wireless sensor networks
    • S. Bag, "A new key predistribution scheme for grid-group deployment of wireless sensor networks," Ad Hoc and Sensor Wireless Networks, vol. 27, no. 3-4, pp. 313-329, 2015.
    • (2015) Ad Hoc and Sensor Wireless Networks , vol.27 , Issue.3-4 , pp. 313-329
    • Bag, S.1
  • 8
    • 79952574261 scopus 로고    scopus 로고
    • A light-weight authentication scheme for wireless sensor networks
    • O. D. Mohatar, A. F. Sabater, and J. M. Sierra, "A light-weight authentication scheme for wireless sensor networks," Ad Hoc Networks, vol. 9, no. 5, pp. 727-735, 2011.
    • (2011) Ad Hoc Networks , vol.9 , Issue.5 , pp. 727-735
    • Mohatar, O.D.1    Sabater, A.F.2    Sierra, J.M.3
  • 9
    • 84928666537 scopus 로고    scopus 로고
    • Trust management system in wireless sensor networks: Design considerations and research challenges
    • F. Ishmanov, A. S. Malik, S. W. Kim, and B. Begalov, "Trust management system in wireless sensor networks: design considerations and research challenges," Transactions on Emerging Telecommunications Technologies, vol. 26, no. 2, pp. 107-130, 2015.
    • (2015) Transactions on Emerging Telecommunications Technologies , vol.26 , Issue.2 , pp. 107-130
    • Ishmanov, F.1    Malik, A.S.2    Kim, S.W.3    Begalov, B.4
  • 10
    • 84959499960 scopus 로고    scopus 로고
    • Wireless physical-layer security: Lessons learned from information theory
    • A. Yener and S. Ulukus, "Wireless physical-layer security: lessons learned from information theory," Proceedings of the IEEE, vol. 103, no. 10, pp. 1814-1825, 2015.
    • (2015) Proceedings of the IEEE , vol.103 , Issue.10 , pp. 1814-1825
    • Yener, A.1    Ulukus, S.2
  • 11
    • 39549092651 scopus 로고    scopus 로고
    • Distributed framework for correlated data gathering in sensor networks
    • J. Rabaey and J. Ammer, "Distributed framework for correlated data gathering in sensor networks," IEEE Transactions onMobile Computing, vol. 57, no. 1, pp. 578-593, 2010.
    • (2010) IEEE Transactions OnMobile Computing , vol.57 , Issue.1 , pp. 578-593
    • Rabaey, J.1    Ammer, J.2
  • 12
    • 84879603362 scopus 로고    scopus 로고
    • Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: A simulation-based approach
    • K. C. Egemen, B.Dan, andD. Amit, "Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: a simulation-based approach," Telecommunication Systems, vol. 2, no. 6, pp. 751-768, 2013.
    • (2013) Telecommunication Systems , vol.2 , Issue.6 , pp. 751-768
    • Egemen, K.C.1    Dan, B.2    Amit, D.3
  • 13
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 14
    • 84860890105 scopus 로고    scopus 로고
    • A survey on MAC protocols for wireless adhoc networks with beamforming antennas
    • O. Bazan and M. Jaseemuddin, "A survey on MAC protocols for wireless adhoc networks with beamforming antennas," IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 216-239, 2012.
    • (2012) IEEE Communications Surveys and Tutorials , vol.14 , Issue.2 , pp. 216-239
    • Bazan, O.1    Jaseemuddin, M.2
  • 15
    • 55149121202 scopus 로고    scopus 로고
    • Research on key technologies for implementing network security situation awareness
    • H.Wang, J. Lai, M.Hu, andY. Liang, "Research on key technologies for implementing network security situation awareness," Geomatics and Information Science ofWuhan University, vol. 33, no. 10, pp. 995-998, 2008.
    • (2008) Geomatics and Information Science OfWuhan University , vol.33 , Issue.10 , pp. 995-998
    • Wang, H.1    Lai, J.2    Hu, M.3    Liang, Y.4
  • 16
    • 84883698532 scopus 로고    scopus 로고
    • On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels
    • P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, "On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1728-1740, 2013.
    • (2013) IEEE Journal on Selected Areas in Communications , vol.31 , Issue.9 , pp. 1728-1740
    • Lin, P.-H.1    Lai, S.-H.2    Lin, S.-C.3    Su, H.-J.4
  • 18
    • 77649222131 scopus 로고    scopus 로고
    • The research of the promotion for ECDSA algorithm based on Montgomery-form ECC
    • C. Wang, X.-Y. Shi, and Z.-H. Niu, "The research of the promotion for ECDSA algorithm based on Montgomery-form ECC," Journal on Communications, vol. 31, no. 1, pp. 9-13, 2010.
    • (2010) Journal on Communications , vol.31 , Issue.1 , pp. 9-13
    • Wang, C.1    Shi, X.-Y.2    Niu, Z.-H.3
  • 19
    • 0036454692 scopus 로고    scopus 로고
    • A scalar multiplication algorithm with recovery of the y-coordinate on the montgomery formand analysis of efficiency for elliptic curve cryptosystems
    • K. Okeya and K. Sakurai, "A scalar multiplication algorithm with recovery of the y-coordinate on the montgomery formand analysis of efficiency for elliptic curve cryptosystems," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 85, no. 1, pp. 84-93, 2002.
    • (2002) IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences , vol.85 , Issue.1 , pp. 84-93
    • Okeya, K.1    Sakurai, K.2
  • 20
    • 55849149470 scopus 로고    scopus 로고
    • Data collection in sensor networks with data mules: An intergrade simulation analysis
    • G. Anastasi and M. Conti, "Data collection in sensor networks with data mules: an intergrade simulation analysis," IEEE Symposium on Computers and Communications, vol. 3, no. 7, pp. 1096-1102, 2012.
    • (2012) IEEE Symposium on Computers and Communications , vol.3 , Issue.7 , pp. 1096-1102
    • Anastasi, G.1    Conti, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.