Key management systems for sensor networks in the context of the Internet of Things
Tóm tắt
Từ khóa
Tài liệu tham khảo
INFSO D.4 Networked Enterprise and RFID INFSO G.2 Micro and Nanosystems, in co-operation with the Working group RFID of the ETP EPOSS, internet of things in 2020: roadmap for the future, 27 May 2008.
Ovidiu V, Harrison M, Vogt H, Kalaboukas K, Tomasella M, Wouters K, et al. Internet of things strategic research roadmap, European Commission – Information Society and Media DG, 2009.
National Intelligence Council, Disruptive Civil Technologies – six technologies with potential impacts on us interests out to 2025, Conference Report CR 2008-07, April 2008.
Akyildiz, 2002, Wireless sensor networks: a survey, Comput Networks, 38, 393, 10.1016/S1389-1286(01)00302-4
Wireless Systems for Automation. Available at: <http://www.isa.org/> (accessed on October, 2010).
IBM: a smarter planet. Available at: <http://www.ibm.com/smarterplanet/> (accessed on October 2010).
HP: a central nervous system for the earth. Available at: <http://www.hpl.hp.com/news/2009/oct-dec/cense.html> (accessed on October 2010).
Montenegro, 2007, RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks, 10.17487/rfc4944
Routing Over Low power and Lossy Networks (roll) Working Group. Internet Engineering Task Force (IETF). Available at: <http://datatracker.ietf.org/wg/roll/charter/> (accessed on October 2010).
Constrained RESTful Environments (core) Working Group. Internet Engineering Task Force (IETF). Available at: <http://datatracker.ietf.org/wg/core/charter/> (accessed on October 2010).
Guinard D, Fischer M, Trifa V. Sharing using social networks in a composable web of things. In: Eighth IEEE international conference on pervasive computing and communications workshops (PERCOM 2010), 2010. p. 702–7. doi:10.1109/PERCOMW.2010.5470524.
Libelium: Interfacing the Sensor Networks with the Web 2.0. Available at: <http://www.libelium.com/> (accessed on October 2010).
Roman, 2009, Integrating wireless sensor networks and the internet: a security analysis, Int Res, 19, 246
Christin, 2009, Wireless sensor networks and the internet of things: selected challenges, Proceedings of the 8th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze
Alcaraz, 2010, A security analysis for wireless sensor mesh networks in highly critical systems, IEEE Trans Syst Man Cybern Part C: Appl Rev, 40, 419, 10.1109/TSMCC.2010.2045373
Healy M, Newe T, Lewis E. Analysis of hardware encryption versus software encryption on wireless sensor network motes. In: Mukhopadhyay SC, Gupta GS, editors. Smart Sensors and Sensing Technology, vol. 20 of Lecture Notes in Electrical Engineering, Springer, Berlin, Heidelberg; 2008. p. 3–14. doi:10.1007/978-3-540-79590-2_1.
Francillon A, Castelluccia C. TinyRNG: A cryptographic random number generator for wireless sensors network nodes. In: Fifth international symposium on modeling and optimization in mobile, ad hoc and wireless networks (WiOpt 2007), 2007. p. 1–7. doi:10.1109/WIOPT.2007.4480051.
Kushalnagar, 2007, RFC 4919: IPv6 over low-power wireless personal area networks (6LoWPANs): overview, Assumptions, Problem Statement, and Goals
Dierks, 2008, RFC 5246: The transport layer security (TLS) protocol version 1.2
OASIS Web Services Security (WSS) TC. Available at: <http://www.oasis-open.org/committees/wss/> (accessed on October 2010).
Amin S, Young YJ, Siddiqui M, Hong CS. A novel intrusion detection framework for IP-based sensor networks. In: International Conference on Information Networking (ICOIN 2009), 2009. p. 1–3.
Weber, 2010, Internet of things – new security and privacy challenges, Comput Law Security Rev, 26, 23, 10.1016/j.clsr.2009.11.008
Eronen, 2005, RFC 4279: pre-shared key ciphersuites for transport layer security (TLS), 10.17487/rfc4279
OASIS Web Services Secure Exchange (WS-SX) TC. Available at: <http://www.oasis-open.org/committees/ws-sx/> (accessed on October 2010).
Oliveira, 2010, TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks, Comput Commun
Bianchi G, Capossele AT, Mei A, Petrioli C. Flexible key exchange negotiation for wireless sensor networks. In: Proceedings of the fifth ACM international workshop on wireless network testbeds, experimental evaluation and characterization, WiNTECH ’10, New York, NY, USA: ACM; 2010. p. 55–62. http://doi.acm.org/10.1145/1860079.1860090.
Akyildiz, 2005, Underwater acoustic sensor networks: research challenges, Ad Hoc Networks, 3, 257, 10.1016/j.adhoc.2005.01.004
Pietro RD, Mancini L, Soriente C, Spognardi A, Tsudik G. Catch me (if you can): data survival in unattended sensor networks. In: Sixth annual IEEE international conference on pervasive computing and communications (PerCom 2008), 2008. p. 185–94. doi:10.1109/PERCOM.2008.31.
Johnson M, Healy M, van de Ven P, Hayes M, Nelson J, Newe T, et al. A comparative review of wireless sensor network mote technologies. In: IEEE Sensors 2009, 2009. p. 1439–42. doi:10.1109/ICSENS.2009.5398442.
Malan D, Welsh M, Smith M. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: First annual IEEE communications society conference on sensor and ad hoc communications and networks (IEEE SECON 2004), 2004. p. 71–80. doi:10.1109/SAHCN.2004.1381904.
Liu A, Ning P, TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, in: International Conference on Information Processing in Sensor Networks (IPSN 2008), 2008, pp. 245–256. doi:10.1109/IPSN.2008.47.
Rabin M. Digitalized signatures and public-key functions as intractable as factorization. Tech. Rep., Cambridge, MA, USA, 1979.
M.A.S., 2010, A survey on key management mechanisms for distributed wireless sensor networks, Comput Networks, 54, 2591, 10.1016/j.comnet.2010.04.010
Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In: Ninth ACM conference on computer and communications security (CCS 2002), 2002. p. 41–47. doi:10.1145/586110.586117.
Du, 2005, A pairwise key predistribution scheme for wireless sensor networks, ACM Trans Inform Syst Security (TISSEC), 8, 228, 10.1145/1065545.1065548
Camtepe, 2007, Combinatorial design of key distribution mechanisms for wireless sensor networks, IEEE/ACM Trans Network, 15, 346, 10.1109/TNET.2007.892879
Liu, 2005, Establishing pairwise keys in distributed sensor networks, ACM Trans Inform Syst Security, 8, 41, 10.1145/1053283.1053287
Anderson R, Chan H, Perrig A. Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE international conference on network protocols (ICNP 2004), 2004. p. 206–215. doi:10.1109/ICNP.2004.1348111.
Lai B, Kim S, Verbauwhede I. Scalable session key construction protocol for wireless sensor networks. In: IEEE workshop on large scale real-time and embedded systems (LARTES 2002), 2002.
Panja B, Madria S, Bhargava B. Energy and communication efficient group key management protocol for hierarchical sensor networks. In: Proceedings of the IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), vol. 1, 2006, p. 8. doi:10.1109/SUTC.2006.1636204.
Seshadri A, Luk M, Perrig A. SAKE: software attestation for key establishment in sensor networks, ad hoc networks, in press. doi:10.1016/j.adhoc.2010.08.011.
Jaworski, 2009, Random key predistribution for wireless sensor networks using deployment knowledge, Computing, 85, 57, 10.1007/s00607-009-0036-9
ATmega128, AVR Solutions. Available at: <http://www.atmel.com/dyn/products/product_card.asp?part_id=2018> (accessed on October 2010).
Dorn, 1962, Generalizations of Horner’s rule for polynomial evaluation, IBM J Res Develop, 6, 239, 10.1147/rd.62.0239
Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of applied cryptography, CRC Press, 2001. Available at: <http://www.cacr.math.uwaterloo.ca/hac/>.