dc.creatorOliveira L.B.
dc.creatorWong H.C.
dc.creatorBern M.
dc.creatorDahab R.
dc.creatorLoureiro A.A.F.
dc.date2006
dc.date2015-06-30T18:04:00Z
dc.date2015-11-26T14:20:08Z
dc.date2015-06-30T18:04:00Z
dc.date2015-11-26T14:20:08Z
dc.date.accessioned2018-03-28T21:21:43Z
dc.date.available2018-03-28T21:21:43Z
dc.identifier0769526403; 9780769526409
dc.identifierProceedings - Fifth Ieee International Symposium On Network Computing And Applications, Nca 2006. , v. 2006, n. , p. 145 - 152, 2006.
dc.identifier
dc.identifier10.1109/NCA.2006.48
dc.identifierhttp://www.scopus.com/inward/record.url?eid=2-s2.0-34247216164&partnerID=40&md5=47094d02f13900635b6eb9f504ffe6d5
dc.identifierhttp://www.repositorio.unicamp.br/handle/REPOSIP/102929
dc.identifierhttp://repositorio.unicamp.br/jspui/handle/REPOSIP/102929
dc.identifier2-s2.0-34247216164
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/1244149
dc.descriptionClustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also advantages in terms of security, the dynamic nature of their communication makes most existing security solutions inadequate for them. In this paper, we show how random key predistribution, widely studied in the context of flat networks, can be used to secure communication in hier-archical (cluster-based) protocols such as LEACH. To our knowledge, it is the first work that investigates random key predistribution as applied to hierarchical WSNs. © 2006 IEEE.
dc.description2006
dc.description
dc.description145
dc.description152
dc.descriptionAkyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E., A survey on sensor networks (2002) IEEE Communications Magazine, 40 (8), pp. 102-114. , August
dc.descriptionBohge, M., Trappe, W., An authentication framework for hierarchical ad hoc sensor networks (2003) 2005 ACM workshop on Wireless security, pp. 79-87
dc.descriptionChan, H., Perrig, A., Song, D., Random key predistribution schemes for sensor networks (2003) IEEE Symposium on Security and Privacy (S&P'03), pp. 197-213. , may
dc.descriptionDu, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A., A pairwise key pre-distribution scheme for wireless sensor networks (2005) ACM Transactions on Information and System Security, , Also appeared in ACM CCS '03
dc.descriptionEschenauer, L., Gligor, V.D., A key management scheme for distributed sensor networks (2002) 9th ACM conference on Computer and communications security, pp. 41-47
dc.descriptionEstrin, D., Govindan, R., Heidemann, J.S., Kumar, S., Next century challenges: Scalable coordination in sensor networks (1999) Mobile Computing and Networking, pp. 263-270. , Seattle, WA USA
dc.descriptionA. C. Ferreira, M. A. Vilaca, L. B. Oliveira, E. Habib, H. C. Wong, and A. A. F. Loureiro. On the security of cluster-based communication protocols for wireless sensor networks. In 4th IEEE International Conference on Networking (ICN'05), 3420 of Lecture Notes in Computer Science, pages 449-458, Reunion Island, April 2005Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H., Energy-efficient communication protocol for wireless microsensor networks (2000) IEEE Hawaii Int. Conf. on System Sciences, pp. 4-7. , January
dc.descriptionHill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K., System architecture directions for networked sensors (2000) int'l Conf. on Architectural support for programming languages andoperating systems, pp. 93-104
dc.descriptionHwang, J., Kim, Y., Revisiting random key predistribution schemes for wireless sensor networks (2004) 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43-52. , ACM Press
dc.descriptionKannan, R., Ray, L., Durresi, A., Efficient key predistribution schemes for sensor networks (2004) 1st European Workshop on Security in Wireless and Ad-Hoc Sensor Networks (ESAS'04), , Heidelberg, Germany, August
dc.descriptionKarlof, C., Sastry, N., Wagner, D., Tinysec: A link layer security architecture for wireless sensor networks (2004) 2nd ACM SensSys, pp. 162-175. , Nov
dc.descriptionKarlof, C., Wagner, D., Secure routing in wireless sensor networks: Attacks and countermeasures (2003) Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1 (2-3), pp. 293-315
dc.descriptionAlso appeared in 1st IEEE International Workshop on Sensor Network Protocols and ApplicationsLiu, D., Ning, P., Li, R., Establishing pairwise keys in distributed sensor networks (2005) ACM Transactions on Information and System Security (TISSEC), 8 (1). , 41-77, Also appeared in ACM CCS '03
dc.descriptionOliveira, L.B., Wong, H.C., Loureiro, A.A.F., Lha-sp: Secure protocols for hierarchical wireless sensor networks (2005) 9th IFIP/IEEE International Symposium on Integrated Network Management (IM'05), pp. 31-44
dc.descriptionPerrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D., SPINS: Security protocols for sensor networks (2002) Wireless Networks, 8 (5). , 521-534, Sept, Also appeared in MobiCom'01
dc.descriptionPietro, R.D., Mancini, L.V., Mei, A., Random keyassignment for secure wireless sensor networks (2003) SASN '03: Of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 62-71. , New York, USA
dc.descriptionSchneier, B., (1996) Applied Cryptography, , Wiley
dc.descriptionWood, A.D., Stankovic, J.A., Denial of service in sensor networks (2002) IEEE Computer, 35 (10), pp. 54-62. , Oct
dc.descriptionZhu, S., Setia, S., Jajodia, S., LEAP: Efficient security mechanisms for large-scale distributed sensor networks (2003) 10th ACM conference on Computer and communication security, pp. 62-72. , ACM Press
dc.descriptionZhu, S., Xu, S., Setia, S., Jajodia, S., Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach (2003) 11th IEEE Inter'l Conference on Network Protocols (ICNP'03), pp. 326-335. , Atlanta
dc.languageen
dc.publisher
dc.relationProceedings - Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006
dc.rightsfechado
dc.sourceScopus
dc.titleSecleach - A Random Key Distribution Solution For Securing Clustered Sensor Networks
dc.typeActas de congresos


Este ítem pertenece a la siguiente institución