RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      Simulation of Distributed Key Management Protocols in Clustered Wireless Sensor Networks

      한글로보기

      https://www.riss.kr/link?id=A75200900

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      In Wireless Sensor Network security has to be mainly provided to two types of communications: one-to-all and one-to-one. This paper proposes a complete set of low complexity protocols to initially generate and distribute two types of secret keys, pe...

      In Wireless Sensor Network security has to be mainly provided to two types of communications: one-to-all and one-to-one. This paper proposes a complete set of low complexity protocols to initially generate and distribute two types of secret keys, periodically renew the keys and change the keys based on cluster dynamics. They are designed for a clustered hierarchical network suitable for data aggregation and all the communications in the protocols are properly authenticated using Elliptic Curve Digital Signature scheme. The security analysis shows that the protocols are strong against several possible attacks. The protocols are implemented for TinyOS using NesC, simulated under TOSSIM and are viable for implementation in resource-constrained platforms like MICA. A major outcome of our simulation is the observation that most of the time rekeying is done because of cluster dynamics. It is therefore suggested that implementing proper authentication protocols and batch rekeying protocols reduce the number of times rekeying is performed, resulting in longer life of the network.

      더보기

      목차 (Table of Contents)

      • Abstract
      • 1. Introduction
      • 2. Sensor Network architecture
      • 3. Proposed Key Management Protocols
      • 3.1 Initial Key Distribution Protocols
      • Abstract
      • 1. Introduction
      • 2. Sensor Network architecture
      • 3. Proposed Key Management Protocols
      • 3.1 Initial Key Distribution Protocols
      • 3.2 Periodic Rekeying Protocols
      • 3.3. Rekeying Protocols with Cluster Dynamics
      • 3.4 Memory required for key storage
      • 4. Security Analysis
      • 6. Related Works
      • 7. Observations from simulations
      • 8. Conclusion
      • 9. References
      더보기

      동일학술지(권/호) 다른 논문

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼