DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Jooyoung | ko |
dc.contributor.author | Stinson, Douglas R | ko |
dc.date.accessioned | 2016-09-07T01:10:24Z | - |
dc.date.available | 2016-09-07T01:10:24Z | - |
dc.date.created | 2016-08-09 | - |
dc.date.created | 2016-08-09 | - |
dc.date.created | 2016-08-09 | - |
dc.date.issued | 2008-03 | - |
dc.identifier.citation | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2 | - |
dc.identifier.issn | 1094-9224 | - |
dc.identifier.uri | http://hdl.handle.net/10203/212519 | - |
dc.description.abstract | In this paper, we discuss the use of combinatorial set systems ( combinatorial designs) in the design of key predistribution schemes ( KPSs) for sensor networks. We show that the performance of a KPS can be improved by carefully choosing a certain class of set systems as key ring spaces. Especially, we analyze KPSs based on a type of combinatorial design known as a transversal design. We employ two types of transversal designs, which are represented by the set of all linear polynomials and the set of quadratic polynomials ( over some finite field), respectively. These KPSs turn out to have significant efficiency in a shared- key discovery phase without degrading connectivity and resiliency. | - |
dc.language | English | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.title | On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs | - |
dc.type | Article | - |
dc.identifier.wosid | 000255193000001 | - |
dc.identifier.scopusid | 2-s2.0-40049091352 | - |
dc.type.rims | ART | - |
dc.citation.volume | 11 | - |
dc.citation.issue | 2 | - |
dc.citation.publicationname | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | - |
dc.identifier.doi | 10.1145/1330332.1330333 | - |
dc.contributor.localauthor | Lee, Jooyoung | - |
dc.contributor.nonIdAuthor | Stinson, Douglas R | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | wireless sensor networks | - |
dc.subject.keywordAuthor | key predistribution | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordPlus | DISTRIBUTION MECHANISMS | - |
dc.subject.keywordPlus | SECURITY | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.