Key Pre-distribution Techniques for WSN Security Services
暂无分享,去创建一个
[1] Ayfer Özgür,et al. Spatial Degrees of Freedom of Large Distributed MIMO Systems and Wireless Ad Hoc Networks , 2013, IEEE Journal on Selected Areas in Communications.
[2] Kalpana Sharma,et al. A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks , 2010 .
[3] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[4] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[5] Yassine Maleh,et al. A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks , 2013, ArXiv.
[6] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[7] J. Spencer. The Strange Logic of Random Graphs , 2001 .
[8] Rabie A. Ramadan,et al. Smart Environmental Monitoring Using Wireless Sensor Networks , 2013 .
[9] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[10] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[12] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[13] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[14] S. Gopalakrishnan,et al. A SURVEY OF WIRELESS NETWORK SECURITY , 2014 .
[15] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[16] Deborah Estrin,et al. Energy conservation by adaptive clustering for ad-hoc networks , 2002 .
[17] Lirui Zhang,et al. BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[18] Rabie A. Ramadan,et al. Wireless Sensor Networks, A Medical Perspective , 2013 .
[19] Jiyong Jang,et al. A Time-Based Key Management Protocol for Wireless Sensor Networks , 2007, ISPEC.
[20] Seema Verma,et al. Analysis of a New Random Key Pre-distribution Scheme Based on Random Graph Theory and Kryptograph , 2012, IAIT 2012.
[21] Mohamed Mostafa M. Fouad,et al. Study of the effects of pairwise key pre-distribution scheme on the performance of a topology control protocol , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[22] Vijay Laxmi,et al. Detection and Countermeasure of Node Misbehaviour in Clustered Wireless Sensor Network , 2013 .
[23] Donggang Liu,et al. Security for Wireless Sensor Networks , 2006, Advances in Information Security.
[24] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[25] Shih-Lin Wu,et al. Wireless Ad Hoc Networking : Personal-Area, Local-Area, and the Sensory-Area Networks , 2007 .
[26] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[27] Sushil Jajodia,et al. Securing Topology Maintenance Protocols for Sensor Networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[28] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[29] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[30] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[31] Jyoteesh Malhotra,et al. Review on Security Issues and Attacks in Wireless Sensor Networks , 2015 .
[32] Yu-Chee Tseng,et al. Wireless Ad Hoc Networking , 2007 .
[33] Mahmut T. Kandemir,et al. The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.
[34] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[35] Ming Li,et al. Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.
[36] Azzedine Boukerche,et al. Algorithms and Protocols for Wireless Sensor Networks , 2008, Wiley series on parallel and distributed computing.
[37] Robert Tappan Morris,et al. Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.
[38] M. M. M. Fouad,et al. SOPK: Second Opportunity Pairwise Key Scheme for Topology Control Protocols , 2012, 2012 Third International Conference on Intelligent Systems Modelling and Simulation.
[39] Roberto Di Pietro,et al. Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN , 2009, SecureComm.
[40] Deborah Estrin,et al. Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .
[41] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[42] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[43] Reza Ebrahimi Atani,et al. A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.
[44] Moti Yung,et al. Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.