A random key management scheme for heterogeneous wireless sensor network
暂无分享,去创建一个
[1] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[2] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[3] Jerzy Jaworski,et al. Random key predistribution for wireless sensor networks using deployment knowledge , 2009, Computing.
[4] Ozgur Koray Sahingoz,et al. Large scale wireless sensor networks with multi-level dynamic key management scheme , 2013, J. Syst. Archit..
[5] Mohamed Abid,et al. RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks , 2011, Personal and Ubiquitous Computing.
[6] Yeh-Ching Chung,et al. Heterogeneous Wireless Sensor Network Deployment and Topology Control Based on Irregular Sensor Model , 2007, GPC.
[7] Hung-Min Sun,et al. Practical RSA signature scheme based on periodical rekeying for wireless sensor networks , 2012, TOSN.
[8] Sencun Zhu,et al. Predistribution and local collaboration-based group rekeying for wireless sensor networks , 2009, Ad Hoc Networks.
[9] Catherine Rosenberg,et al. A minimum cost heterogeneous sensor network with a lifetime constraint , 2005, IEEE Transactions on Mobile Computing.
[10] Neeraj Mittal,et al. Cluster-Based Key Predistribution Using Deployment Knowledge , 2010, IEEE Transactions on Dependable and Secure Computing.
[11] Suresh Singh,et al. Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[12] Huifang Chen,et al. One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks , 2013, Ad Hoc Networks.
[13] Ieee Staff,et al. 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) , 2015 .
[14] Yunghsiang Sam Han,et al. A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.