메뉴 건너뛰기




Volumn 3, Issue 4, 2004, Pages 800-836

Multilevel μTESLA: Broadcast Authentication for Distributed Sensor Networks

Author keywords

Broadcast authentication; Design; Security; sensor networks; TESLA

Indexed keywords


EID: 85000276942     PISSN: 15399087     EISSN: 15583465     Source Type: Journal    
DOI: 10.1145/1027794.1027800     Document Type: Article
Times cited : (307)

References (32)
  • 4
    • 33744722595 scopus 로고    scopus 로고
    • FLAMeS: Fast, loss-tolerant authentication of multicast stream. Tech
    • rep., BT Research
    • Briscoe, B., 2000. FLAMeS: Fast, loss-tolerant authentication of multicast stream. Tech. rep., BT Research.
    • (2000)
    • Briscoe, B.1
  • 6
    • 4544365398 scopus 로고    scopus 로고
    • Constrains and approaches for distributed sensor network security
    • Tech. rep., NAI Labs
    • Carman, D., Kruus, P., Matt, B. J., 2000. Constrains and approaches for distributed sensor network security. Tech. rep., NAI Labs.
    • (2000)
    • Carman, D.1    Kruus, P.2    Matt, B.J.3
  • 8
    • 0031383687 scopus 로고    scopus 로고
    • An efficient message authentication scheme for link state routing
    • San Diego, California
    • Cheung, S., 1997. An efficient message authentication scheme for link state routing. In 13th Annual Computer Security Applications conference. San Diego, California.
    • (1997) 13th Annual Computer Security Applications conference.
    • Cheung, S.1
  • 12
    • 17844362127 scopus 로고    scopus 로고
    • How to sign digital streams. Tech
    • rep., IBM T.J. Watson Research Center
    • Gennaro, R., Rohatgi, P., 1997. How to sign digital streams. Tech. rep., IBM T.J. Watson Research Center.
    • (1997)
    • Gennaro, R.1    Rohatgi, P.2
  • 13
    • 0022793132 scopus 로고
    • How to construct random functions
    • October
    • Goldreich, O., Goldwasser, S., Micali, S., 1986. How to construct random functions. J. ACM 33, 4 (October), 792-807.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 17
    • 0003729341 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • IETF RFC 2104
    • Krawczyk, H., Bellare, M., Canetti, R., 1997. HMAC: Keyed-hashing for message authentication. IETF RFC 2104.
    • (1997)
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 18
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L., 1981. Password authentication with insecure communication. Commun. ACM 24, 11, 770-772.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 23
    • 33746530387 scopus 로고    scopus 로고
    • TESLA: Multicast source authentication transform
    • IRTF draft, draft-irtf-smug-tesla-00.txt
    • Perrig, A., Canetti, R., Briscoe Tygar, J., and Song, D. 2000a. TESLA: Multicast source authentication transform. IRTF draft, draft-irtf-smug-tesla-00.txt.
    • (2000)
    • Perrig, A.1    Canetti, R.2    Briscoe Tygar, J.3    Song, D.4
  • 27
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., Adleman, L., 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2, 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 31
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood, A. D. and Stankovic, J. A. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10, 54-62.
    • (2002) IEEE Comput. , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.