完整後設資料紀錄
DC 欄位語言
dc.contributor.authorTsai, Shi-Chunen_US
dc.contributor.authorTzeng, Wen-Gueyen_US
dc.contributor.authorZhou, Kun-Yien_US
dc.date.accessioned2014-12-08T15:09:56Z-
dc.date.available2014-12-08T15:09:56Z-
dc.date.issued2009-03-01en_US
dc.identifier.issn1536-1276en_US
dc.identifier.urihttp://dx.doi.org/10.1109/TWC.2009.081048en_US
dc.identifier.urihttp://hdl.handle.net/11536/7591-
dc.description.abstractIn this paper we re-examine the attacking scenario about wireless sensor networks. It is generally assumed that the adversary picks up all radio communications of sensor nodes without any loss and stores the eavesdropped messages for later use. We suggest that in some situations the adversary may not be able to pick up all radio communications of sensor nodes. Therefore, we propose the storage-bounded adversary model for wireless sensor networks, in which the adversary's storage is bounded. We propose two key establishment schemes for establishing shared keys for neighboring sensor nodes in the storage-bounded adversary model. The first scheme needs special beacon nodes for broadcasting random bits. In the second scheme, some sensor nodes play the role of beacon nodes. Our results are theoretical in some sense. Nevertheless, we can adjust them for realistic consideration.en_US
dc.language.isoen_USen_US
dc.subjectBounded-storage modelen_US
dc.subjectkey establishmenten_US
dc.subjectun-conditional securityen_US
dc.subjectwireless sensor networken_US
dc.titleKey Establishment Schemes against Storage-Bounded Adversaries in Wireless Sensor Networksen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TWC.2009.081048en_US
dc.identifier.journalIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONSen_US
dc.citation.volume8en_US
dc.citation.issue3en_US
dc.citation.spage1218en_US
dc.citation.epage1222en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000264293200030-
dc.citation.woscount4-
顯示於類別:期刊論文


文件中的檔案:

  1. 000264293200030.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。