참고문헌
- A. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," In PerCom, pp. 324-328, 2005.
- D.J. Malan, M. Welsh, and M.D. Smith, “A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,” In First IEEE Int. Conf. on Sensor and Ad Hoc Comm. and Networks, pp. 71-80, 2004.
- N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz, “Comparing elliptic curve cryptography and rsa on 8-bit CPUs,” In CHES, pages 119-132, 2004.
- D. Nyang and A. Mohaisen, “Cooperative public key authentication protocol in wireless sensor network,” In UIC, pp. 864-873, 2006.
- A. Mohaisen, D. Nyang, Y. Maeng, and K. Lee, "Structures for communication efficient public key revocation in ubiquitous sensor network," In MSN, pp. 822-833. Springer, 2007.
- Md. M. Haque, A.-S.K. Pathan, C.S. Hong, and E. Huh, “An asymmetric key-based security architecture for wireless sensor networks,” TIIS, vol. 2, no. 5, pp. 265-279, 2008. https://doi.org/10.3837/tiis.2008.05.004
- D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” In ACM CCS, pp. 52-61, 2003.
- W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 8, no.2, pp. 228-258, 2005. https://doi.org/10.1145/1065545.1065548
- A. Mohaisen, Y. Maeng, and D. Nyang, “On grid-based key pre-distribution: Toward a better connectivity in wireless sensor network,” In PAKDD Workshops, pp. 527-537, 2007.
- A. Mohaisen and D. Nyang, “Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks,” In EWSN, pp. 83-98, 2006.
- D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 8, no. 1, pp. 41-77, 2005. https://doi.org/10.1145/1053283.1053287
- T. Ito, H. Ohta, N. Matsuda, and T. Yoneda, “A key pre-distribution scheme for secure sensor networks using probability density function of node deployment,” In SASN, pp. 69-75. ACM, Oct. 2005.
- A. Mohaisen, D. Nyang, Y. Maeng, K. Lee, and D. Hong, “Grid-based key pre-distribution in wireless sensor networks,” TIIS, vol. 3, no. 2, pp. 195-208, 2009. https://doi.org/10.3837/tiis.2009.02.005
- A. Mohaisen, D. Nyang, and T. AbuHmed, “Two-level key pool design-based random key pre-distribution in wireless sensor networks,” TIIS, vol. 2, no. 5, pp. 222-238, 2008. https://doi.org/10.3837/tiis.2008.05.001
- L. Eschenauer and V.D. Gligor, "A key-management scheme for distributed sensor networks," In ACM CCS, pp. 41-47, 2002.
- S.R. Blackburn, T. Etzion, K.M. Martin, and M.B. Paterson, “Efficient key predistribution for grid-based wireless sensor networks,” In ICITS, vol. 5155 of LNCS, pp. 54-69, 2008.
- W. Di_e and M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976. https://doi.org/10.1109/TIT.1976.1055638
피인용 문헌
- Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks vol.7, pp.1, 2013, https://doi.org/10.1109/jsyst.2012.2188689
- A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network vol.21, pp.2, 2016, https://doi.org/10.1007/s11036-016-0683-y
- Energy-aware and secure routing with trust for disaster response wireless sensor network vol.10, pp.1, 2017, https://doi.org/10.1007/s12083-015-0421-4
- An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor Network : vol.8, pp.2, 2017, https://doi.org/10.4018/ijismd.2017040102