A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Hi-index | 0.00 |
In a Ubiquitous environment many individual devices which have the communication ability with the computation ability are connected with one another. For this change we must be preceded study of Radio Frequency Identification (RFID) afterward research of a sensor network. And we must grasp the threat to protect the RFID system. In this paper we propose safe RFID system modeling based on shared key pool in ubiquitous environment. This proposed modeling is secured to RFID system from many security threat and privacy problem, and it has shorter access delay time. We expect this proposed modeling to be used in ubiquitous environment for the RFID system being safe.