Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tsai, Shi-Chun | en_US |
dc.contributor.author | Tzeng, Wen-Guey | en_US |
dc.contributor.author | Zhou, Kun-Yi | en_US |
dc.date.accessioned | 2014-12-08T15:09:56Z | - |
dc.date.available | 2014-12-08T15:09:56Z | - |
dc.date.issued | 2009-03-01 | en_US |
dc.identifier.issn | 1536-1276 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/TWC.2009.081048 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/7591 | - |
dc.description.abstract | In this paper we re-examine the attacking scenario about wireless sensor networks. It is generally assumed that the adversary picks up all radio communications of sensor nodes without any loss and stores the eavesdropped messages for later use. We suggest that in some situations the adversary may not be able to pick up all radio communications of sensor nodes. Therefore, we propose the storage-bounded adversary model for wireless sensor networks, in which the adversary's storage is bounded. We propose two key establishment schemes for establishing shared keys for neighboring sensor nodes in the storage-bounded adversary model. The first scheme needs special beacon nodes for broadcasting random bits. In the second scheme, some sensor nodes play the role of beacon nodes. Our results are theoretical in some sense. Nevertheless, we can adjust them for realistic consideration. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Bounded-storage model | en_US |
dc.subject | key establishment | en_US |
dc.subject | un-conditional security | en_US |
dc.subject | wireless sensor network | en_US |
dc.title | Key Establishment Schemes against Storage-Bounded Adversaries in Wireless Sensor Networks | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/TWC.2009.081048 | en_US |
dc.identifier.journal | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | en_US |
dc.citation.volume | 8 | en_US |
dc.citation.issue | 3 | en_US |
dc.citation.spage | 1218 | en_US |
dc.citation.epage | 1222 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000264293200030 | - |
dc.citation.woscount | 4 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.