WEKO3
アイテム
Resiliency of Secret Sharing Schemes against Node Capture Attacks for Wireless Sensor Networks
https://ipsj.ixsq.nii.ac.jp/records/89858
https://ipsj.ixsq.nii.ac.jp/records/89858e610bc23-68c6-4a3a-ab84-50d15119c2bb
| 名前 / ファイル | ライセンス | アクション |
|---|---|---|
|
|
Copyright (c) 2008 by the Information Processing Society of Japan
|
|
| オープンアクセス | ||
| Item type | Symposium(1) | |||||||
|---|---|---|---|---|---|---|---|---|
| 公開日 | 2008-12-03 | |||||||
| タイトル | ||||||||
| タイトル | Resiliency of Secret Sharing Schemes against Node Capture Attacks for Wireless Sensor Networks | |||||||
| タイトル | ||||||||
| 言語 | en | |||||||
| タイトル | Resiliency of Secret Sharing Schemes against Node Capture Attacks for Wireless Sensor Networks | |||||||
| 言語 | ||||||||
| 言語 | eng | |||||||
| キーワード | ||||||||
| 主題Scheme | Other | |||||||
| 主題 | マルチメディア通信と分散処理ワークショップ | |||||||
| 資源タイプ | ||||||||
| 資源タイプ識別子 | http://purl.org/coar/resource_type/c_5794 | |||||||
| 資源タイプ | conference paper | |||||||
| 著者所属 | ||||||||
| Graduate School of Information Sciences, Hiroshima City University 3-4-1 Ozuka Higashi, Asaminami-ku, Hiroshima, Japan, 731-3194 | ||||||||
| 著者所属(英) | ||||||||
| en | ||||||||
| Graduate School of Information Sciences, Hiroshima City University 3-4-1 Ozuka Higashi, Asaminami-ku, Hiroshima, Japan, 731-3194 | ||||||||
| 著者名 |
Eitaro, KOHNO
Tomoyuki, OHTA
Yoshiaki, KAKUDA
× Eitaro, KOHNO Tomoyuki, OHTA Yoshiaki, KAKUDA
|
|||||||
| 著者名(英) |
Eitaro, KOHNO
Tomoyuki, OHTA
Yoshiaki, KAKUDA
× Eitaro, KOHNO Tomoyuki, OHTA Yoshiaki, KAKUDA
|
|||||||
| 論文抄録 | ||||||||
| 内容記述タイプ | Other | |||||||
| 内容記述 | In wireless sensor networks, the data is transmitted by radio waves. Sensor nodes, which are used in wireless sensor networks, have limited computational power and memory size. The data is vulnerable to attack due to the nature of the systems so maintaining confidentiality is an important problem. However, it is difficult to apply general methods of security to wireless sensor networks. Most methods are based on common (secret) key cryptosystems or public key cryptosystems. However, these methods do not protect against node capture attacks. In this paper, we propose a new distribution method resilient against node capture attacks using Secret Sharing Scheme. In addition, we will confirm the ability of our method to improve resiliency against node capture attacks, comparing it with TinySec, which is the major security architecture of wireless sensor networks. | |||||||
| 論文抄録(英) | ||||||||
| 内容記述タイプ | Other | |||||||
| 内容記述 | In wireless sensor networks, the data is transmitted by radio waves. Sensor nodes, which are used in wireless sensor networks, have limited computational power and memory size. The data is vulnerable to attack due to the nature of the systems so maintaining confidentiality is an important problem. However, it is difficult to apply general methods of security to wireless sensor networks. Most methods are based on common (secret) key cryptosystems or public key cryptosystems. However, these methods do not protect against node capture attacks. In this paper, we propose a new distribution method resilient against node capture attacks using Secret Sharing Scheme. In addition, we will confirm the ability of our method to improve resiliency against node capture attacks, comparing it with TinySec, which is the major security architecture of wireless sensor networks. | |||||||
| 書誌情報 |
マルチメディア通信と分散処理ワークショップ論文集 巻 2008, 号 14, p. 285-290, 発行日 2008-12-03 |
|||||||
| 出版者 | ||||||||
| 言語 | ja | |||||||
| 出版者 | 情報処理学会 | |||||||