TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks
暂无分享,去创建一个
[1] Maurizio Rebaudengo,et al. A Key Distribution Scheme for Mobile Wireless Sensor Networks: $q$ - $s$ -Composite , 2017, IEEE Transactions on Information Forensics and Security.
[2] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[3] David E. Culler,et al. Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.
[4] Adam Dunkels,et al. Software-based on-line energy estimation for sensor nodes , 2007, EmNets '07.
[5] Radha Poovendran,et al. Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[6] Vinoth Chakkaravarthy Ganesan,et al. Cost-effective polynomial-based multicast-unicast key distribution framework for secure group communication in IPv6 multicast networks , 2016, IET Inf. Secur..
[7] Marco Tiloca,et al. Axiom: DTLS-Based Secure IoT Group Communication , 2017, ACM Trans. Embed. Comput. Syst..
[8] Feipei Lai,et al. Efficient Group Key Management Protocol with One-Way Key Derivation , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[9] Mohamed Abid,et al. RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks , 2011, Personal and Ubiquitous Computing.
[10] George C. Oikonomou,et al. Stateless multicast forwarding with RPL in 6LowPAN sensor networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[11] Muhammad Sher,et al. A Lightweight Key Freshness Scheme for Wireless Sensor Networks , 2015, 2015 12th International Conference on Information Technology - New Generations.
[12] Aleksandra Mileva,et al. Running and Testing Applications for Contiki OS Using Cooja Simulator , 2016 .
[13] Xiaochen Li,et al. Energy-Efficient Group Key Agreement for Wireless Networks , 2015, IEEE Transactions on Wireless Communications.
[14] Carsten Bormann,et al. Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.
[15] Wen-Long Chin,et al. Energy Big Data Security Threats in IoT-Based Smart Grid Communications , 2017, IEEE Communications Magazine.
[16] Khmaies Ouahada,et al. Internet of things data integrity , 2017, 2017 IST-Africa Week Conference (IST-Africa).
[17] Seung-Woo Seo,et al. Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks , 2010, Wirel. Pers. Commun..
[18] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[19] Mauro Conti,et al. REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks , 2017, ARES.
[20] Sandeep K. Sood,et al. An Energy-Efficient Architecture for the Internet of Things (IoT) , 2017, IEEE Systems Journal.
[21] Gianluca Dini,et al. LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks , 2011, TECS.
[22] Georgios Kambourakis,et al. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs , 2011, IEEE Communications Surveys & Tutorials.
[23] Michael Schukat,et al. Public key infrastructures and digital certificates for the Internet of things , 2015, 2015 26th Irish Signals and Systems Conference (ISSC).
[24] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[25] Andrea Visconti,et al. On the Weaknesses of PBKDF2 , 2015, CANS.
[26] Wendy Hui Wang,et al. A decentralized key management scheme via neighborhood prediction in mobile wireless networks , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).