Full metadata record
DC FieldValueLanguage
dc.contributor.authorTsai, Shi-Chunen_US
dc.contributor.authorTzeng, Wen-Gueyen_US
dc.contributor.authorZhou, Kun-Yien_US
dc.date.accessioned2014-12-08T15:09:56Z-
dc.date.available2014-12-08T15:09:56Z-
dc.date.issued2009-03-01en_US
dc.identifier.issn1536-1276en_US
dc.identifier.urihttp://dx.doi.org/10.1109/TWC.2009.081048en_US
dc.identifier.urihttp://hdl.handle.net/11536/7591-
dc.description.abstractIn this paper we re-examine the attacking scenario about wireless sensor networks. It is generally assumed that the adversary picks up all radio communications of sensor nodes without any loss and stores the eavesdropped messages for later use. We suggest that in some situations the adversary may not be able to pick up all radio communications of sensor nodes. Therefore, we propose the storage-bounded adversary model for wireless sensor networks, in which the adversary's storage is bounded. We propose two key establishment schemes for establishing shared keys for neighboring sensor nodes in the storage-bounded adversary model. The first scheme needs special beacon nodes for broadcasting random bits. In the second scheme, some sensor nodes play the role of beacon nodes. Our results are theoretical in some sense. Nevertheless, we can adjust them for realistic consideration.en_US
dc.language.isoen_USen_US
dc.subjectBounded-storage modelen_US
dc.subjectkey establishmenten_US
dc.subjectun-conditional securityen_US
dc.subjectwireless sensor networken_US
dc.titleKey Establishment Schemes against Storage-Bounded Adversaries in Wireless Sensor Networksen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TWC.2009.081048en_US
dc.identifier.journalIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONSen_US
dc.citation.volume8en_US
dc.citation.issue3en_US
dc.citation.spage1218en_US
dc.citation.epage1222en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000264293200030-
dc.citation.woscount4-
Appears in Collections:Articles


Files in This Item:

  1. 000264293200030.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.