Providing End-to-End Secure Communications in Wireless Sensor Networks
暂无分享,去创建一个
Sriram Chellappan | Xiaole Bai | Wenjun Gu | Neelanjana Dutta | S. Chellappan | Xiaole Bai | Wenjun Gu | Neelanjana Dutta
[1] DongGook Park,et al. A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA , 2009, J. Inform. and Commun. Convergence Engineering.
[2] Panos K. Chrysanthis,et al. In-network data acquisition and replication in mobile sensor networks , 2010, Distributed and Parallel Databases.
[3] A. S. Poornima,et al. Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks , 2009 .
[4] Ashok Kumar Das. An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks , 2009, 2009 First International Communication Systems and Networks and Workshops.
[5] Yi Qian,et al. A design of optimal key management scheme for secure and survivable wireless sensor networks , 2008, Secur. Commun. Networks.
[6] I-En Liao,et al. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[7] Hossam S. Hassanein,et al. Rate Splitting MIMO-based MAC Protocol , 2007 .
[8] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[9] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[10] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[12] Douglas R. Stinson,et al. Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.
[13] Donggang Liu,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.
[14] Myong-Soon Park,et al. An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[15] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[16] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[17] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[18] David Llewellyn-Jones,et al. Group-based key management for Mobile Sensor Networks , 2010, 2010 IEEE Sarnoff Symposium.
[19] Yunho Lee,et al. A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks , 2009, ArXiv.
[20] Bruno Dutertre,et al. Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .
[21] Hangyang Dai,et al. Triangle-based key management scheme for wireless sensor networks , 2009 .
[22] J. Spencer. The Strange Logic of Random Graphs , 2001 .
[23] Junghyun Lee,et al. Energy Efficient Key Management Protocol in Wireless Sensor Networks , 2010 .
[24] Bin Ma,et al. Deploying Wireless Sensor Networks under Limited Mobility Constraints , 2007, IEEE Transactions on Mobile Computing.
[25] Tian He,et al. SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.
[26] Robert H. Deng,et al. Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks , 2009, SecureComm.
[27] Yong Wang,et al. An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks , 2010, Wirel. Sens. Netw..
[28] Douglas R. Stinson,et al. A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[29] Venkatesh Sarangan,et al. Key management in wireless sensor networks with inter-network sensor roaming , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[30] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[31] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[32] Donggang Liu,et al. Group-based key predistribution for wireless sensor networks , 2008, TOSN.
[33] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[34] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[35] Thomas G. Robertazzi,et al. Critical connectivity phenomena in multihop radio models , 1989, IEEE Trans. Commun..
[36] Mário Serafim Nunes,et al. Probabilistic Key Management Practical Concerns in Wireless Sensor Networks , 2008, J. Networks.
[37] Ahmed Helmy,et al. Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.
[38] Parameswaran Ramanathan,et al. Modeling latency—lifetime trade-off for target detection in mobile sensor networks , 2010, TOSN.
[39] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[40] A. S. Poornima,et al. Tree-based key management scheme for heterogeneous sensor networks , 2008, 2008 16th IEEE International Conference on Networks.
[41] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[42] M. Venkatesh,et al. Sensor Network Traffic-Adaptive Key Management Scheme , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[43] Tharam S. Dillon,et al. A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.
[44] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[45] Thomas F. La Porta,et al. Establishing Pair-Wise Keys in Heterogeneous Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[46] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[47] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[48] Thomas F. La Porta,et al. Movement-assisted sensor deployment , 2004, IEEE INFOCOM 2004.
[49] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[50] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[51] Mani Srivastava,et al. Energy efficient routing in wireless sensor networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[52] Young-Koo Lee,et al. Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[53] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[54] S.A.G. Chandler,et al. Calculation of number of relay hops required in randomly located radio network , 1989 .
[55] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[56] Young-Koo Lee,et al. HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).
[57] Mark A. Shayman,et al. Energy Efficient Routing in Wireless Sensor Networks , 2003 .