References
- J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Commun., vol. 11, no. 6, pp. 6-28, Dec. 2004.
- W. S. Juang, "Efficient user authentication and key agreement in wireless sensor networks," in Proc. Int. Workshop Inform. Security Applicat. (WISA '06), pp. 15-29, Jeju Island, Korea, Aug. 2006.
- T. T. Huyen and E. N. Huh, "A reliable 2-mode authentication framework for ubiquitous sensor network," J. Korean Soc. Internet Inform. (KSII), vol.10, no.3, pp. 51-60 Jun. 2008.
- T. T. Huyen and E. N. Huh, "An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network," in Proc. Int. Conf. Ubiquitous Inform. Management Commun. (ICUIMC'08), pp. 441-447, Suwon, Korea, Jan.-Feb. 2008.
- C. Perrig, "SPINS: security protocols for sensor networks," J. ACM Wireless Networks, vol. 8, no. 5, pp. 521-534, Sep. 2002. https://doi.org/10.1023/A:1016598314198
- S. H. Lee and J. B. Suk, "Improvement of energy efficiency of LEACH protocol for wireless sensor networks," J. Korea Inform. Commun. Soc. (KICS), vol. 33, no. 2, pp. 76-81, Feb. 2008.
- G. Yang, C. M. Rong, C. Veigner, J. T. Wang, and H. B. Cheng, "Identity-based key agreement and encryption for wireless sensor networks," J. China Univ. Posts Telecommun., vol. 12, no. 4, pp. 54-60, Dec. 2006.
- B. S. Kim and H. B. Lim, "A study on node authentication mechanism using sensor node's energy value in WSN," J. Inst. Electron. Eng. Korea (IEEK), vol. 48, no. 2, pp. 86-95, Mar. 2011.
- Y. Y. Choo, H. J. Choi, and J. W. Kwon, "Algorithm improving network life-time based on LEACH protocol," J. Korean Inst. Commun. Inform. Sci. (KICS), vol. 35, no. 8. pp. 810-819, Aug. 2010.
- M. L. Kim, H. S. Kim, and Y. D. Son, "The conversion method from ID-based encryption to ID-based dynamic threshold encryption," J. Korea Inst. Inform. Security Cryptology (KIISC), vol. 22, no. 4, pp. 733-744, Aug. 2012.
- H. Chan and A. Perrig, "PIKE: peer intermediaries for key establishment in sensor networks," in Proc. IEEE INFOCOM Conf., pp. 524-535, Miami, U.S.A., Mar. 2005.
- D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Advances Cryptology Conf. (CRYPTO 2001), pp. 213-229, Santa Barbara, U.S.A., Aug. 2001.
- A. Shamir, "Identity-based crypto systems and signature schemes," in Proc. Advances Cryptology (CRYPTO 84), pp. 47-53, Santa Barbara, U.S.A., Aug. 1984.
- Y. B. Cho and S. H. Lee, "An IDE based hierarchical node authentication protocol for secure data transmission in WSN environment," J. Korean Inst. Commun. Inform. Sci. (KICS), vol. 37B, no. 3, pp. 149-157, Mar. 2012. https://doi.org/10.7840/KICS.2012.37B.3.149
Cited by
- On the HIDE based Group Signature for Secure Personal Healthcare Record Service vol.19, pp.10, 2015, https://doi.org/10.6109/jkiice.2015.19.10.2481