원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.8 No.5
2014.09
pp.457-470
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Related Works
3. Network and Threat Models
3.1 Network Model
3.2 Threat Model
4. Protocol Descriptions
4.1 Clock Frequency and Skew
4.2 System Initialization
4.3 Formation of Secure Routing
4.4 Encrypted Data Transmission
5. Security Analyses
5.1 Key Dynamics and Accuracy
5.2 Passive Attacks
5.3 Active Attacks
5.4 Node Capture
5.5 New Nodes Joining and "Plug and Play"
6. Performance Analyses
6.1 Storage Overhead
6.2 Computational Overhead
6.3 Energy Overhead
7. Conclusions
References
1. Introduction
2. Related Works
3. Network and Threat Models
3.1 Network Model
3.2 Threat Model
4. Protocol Descriptions
4.1 Clock Frequency and Skew
4.2 System Initialization
4.3 Formation of Secure Routing
4.4 Encrypted Data Transmission
5. Security Analyses
5.1 Key Dynamics and Accuracy
5.2 Passive Attacks
5.3 Active Attacks
5.4 Node Capture
5.5 New Nodes Joining and "Plug and Play"
6. Performance Analyses
6.1 Storage Overhead
6.2 Computational Overhead
6.3 Energy Overhead
7. Conclusions
References
저자정보
참고문헌
자료제공 : 네이버학술정보
