ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. シンポジウム
  2. シンポジウムシリーズ
  3. マルチメディア通信と分散処理ワークショップ
  4. 2008

Resiliency of Secret Sharing Schemes against Node Capture Attacks for Wireless Sensor Networks

https://ipsj.ixsq.nii.ac.jp/records/89858
https://ipsj.ixsq.nii.ac.jp/records/89858
e610bc23-68c6-4a3a-ab84-50d15119c2bb
名前 / ファイル ライセンス アクション
IPSJ-DPSWS2008056.pdf IPSJ-DPSWS2008056.pdf (5.6 MB)
Copyright (c) 2008 by the Information Processing Society of Japan
オープンアクセス
Item type Symposium(1)
公開日 2008-12-03
タイトル
タイトル Resiliency of Secret Sharing Schemes against Node Capture Attacks for Wireless Sensor Networks
タイトル
言語 en
タイトル Resiliency of Secret Sharing Schemes against Node Capture Attacks for Wireless Sensor Networks
言語
言語 eng
キーワード
主題Scheme Other
主題 マルチメディア通信と分散処理ワークショップ
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
著者所属
Graduate School of Information Sciences, Hiroshima City University 3-4-1 Ozuka Higashi, Asaminami-ku, Hiroshima, Japan, 731-3194
著者所属(英)
en
Graduate School of Information Sciences, Hiroshima City University 3-4-1 Ozuka Higashi, Asaminami-ku, Hiroshima, Japan, 731-3194
著者名 Eitaro, KOHNO Tomoyuki, OHTA Yoshiaki, KAKUDA

× Eitaro, KOHNO Tomoyuki, OHTA Yoshiaki, KAKUDA

Eitaro, KOHNO
Tomoyuki, OHTA
Yoshiaki, KAKUDA

Search repository
著者名(英) Eitaro, KOHNO Tomoyuki, OHTA Yoshiaki, KAKUDA

× Eitaro, KOHNO Tomoyuki, OHTA Yoshiaki, KAKUDA

en Eitaro, KOHNO
Tomoyuki, OHTA
Yoshiaki, KAKUDA

Search repository
論文抄録
内容記述タイプ Other
内容記述 In wireless sensor networks, the data is transmitted by radio waves. Sensor nodes, which are used in wireless sensor networks, have limited computational power and memory size. The data is vulnerable to attack due to the nature of the systems so maintaining confidentiality is an important problem. However, it is difficult to apply general methods of security to wireless sensor networks. Most methods are based on common (secret) key cryptosystems or public key cryptosystems. However, these methods do not protect against node capture attacks. In this paper, we propose a new distribution method resilient against node capture attacks using Secret Sharing Scheme. In addition, we will confirm the ability of our method to improve resiliency against node capture attacks, comparing it with TinySec, which is the major security architecture of wireless sensor networks.
論文抄録(英)
内容記述タイプ Other
内容記述 In wireless sensor networks, the data is transmitted by radio waves. Sensor nodes, which are used in wireless sensor networks, have limited computational power and memory size. The data is vulnerable to attack due to the nature of the systems so maintaining confidentiality is an important problem. However, it is difficult to apply general methods of security to wireless sensor networks. Most methods are based on common (secret) key cryptosystems or public key cryptosystems. However, these methods do not protect against node capture attacks. In this paper, we propose a new distribution method resilient against node capture attacks using Secret Sharing Scheme. In addition, we will confirm the ability of our method to improve resiliency against node capture attacks, comparing it with TinySec, which is the major security architecture of wireless sensor networks.
書誌情報 マルチメディア通信と分散処理ワークショップ論文集

巻 2008, 号 14, p. 285-290, 発行日 2008-12-03
出版者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-21 16:20:10.874615
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3