A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks
暂无分享,去创建一个
Mohsen Guizani | Xiaojiang Du | Yang Xiao | Song Ci | Hsiao-Hwa Chen | S. Ci | Hsiao-Hwa Chen | M. Guizani | Xiaojiang Du | Yang Xiao
[1] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[2] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[3] Deborah Estrin,et al. Preprocessing in a Tiered Sensor Network for Habitat Monitoring , 2003, EURASIP J. Adv. Signal Process..
[4] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[6] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[7] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[8] David E. Culler,et al. Hood: a neighborhood abstraction for sensor networks , 2004, MobiSys '04.
[9] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[10] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[11] Xiaojiang Du,et al. Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..
[12] Xiaoyan Hong,et al. Landmark routing in ad hoc networks with mobile backbones , 2003, J. Parallel Distributed Comput..
[13] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[14] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[15] Sheng Liu,et al. Techniques for minimizing power consumption in low data-rate wireless sensor networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[16] Fabian Kuhn,et al. Worst-Case optimal and average-case efficient geometric ad-hoc routing , 2003, MobiHoc '03.
[17] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[18] Suresh Singh,et al. Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[19] Deborah Estrin,et al. A system for simulation, emulation, and deployment of heterogeneous sensor networks , 2004, SenSys '04.
[20] Xiaojiang Du,et al. Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks , 2006, Int. J. Wirel. Mob. Comput..
[21] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[22] Baltasar Beferull-Lozano,et al. Lossy network correlated data gathering with high-resolution coding , 2005, IEEE Transactions on Information Theory.
[23] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[24] Xiaoyan Hong,et al. An ad hoc network with mobile backbones , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[25] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[26] Mingyan Liu,et al. Data-gathering wireless sensor networks: organization and capacity , 2003, Comput. Networks.