RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Simulation of Distributed Key Management Protocols in Clustered Wireless Sensor Networks

        Jibi Abraham,K S Ramanatha 보안공학연구지원센터 2007 International Journal of Security and Its Applicat Vol.1 No.2

        In Wireless Sensor Network security has to be mainly provided to two types of communications: one-to-all and one-to-one. This paper proposes a complete set of low complexity protocols to initially generate and distribute two types of secret keys, periodically renew the keys and change the keys based on cluster dynamics. They are designed for a clustered hierarchical network suitable for data aggregation and all the communications in the protocols are properly authenticated using Elliptic Curve Digital Signature scheme. The security analysis shows that the protocols are strong against several possible attacks. The protocols are implemented for TinyOS using NesC, simulated under TOSSIM and are viable for implementation in resource-constrained platforms like MICA. A major outcome of our simulation is the observation that most of the time rekeying is done because of cluster dynamics. It is therefore suggested that implementing proper authentication protocols and batch rekeying protocols reduce the number of times rekeying is performed, resulting in longer life of the network.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼