Mobile node authentication using key distribution scheme in wireless sensor networks
暂无分享,去创建一个
K. R. Venugopal | Lalit M. Patnaik | K. Shaila | S. H. Manjula | K. Venugopal | L. Patnaik | S. Manjula | K. Shaila
[1] Cheng-Hung Liu,et al. A moving algorithm for non-uniform deployment in mobile sensor networks , 2011, Int. J. Auton. Adapt. Commun. Syst..
[2] L.M. Patnaik,et al. Adaptive Mobility and Availability of a Mobile Node for Efficient Secret Key Distribution inWireless Sensor Networks , 2010, 2010 Second International Conference on Machine Learning and Computing.
[3] Ahmed Bouridane,et al. Improving Key Distribution forWireless Sensor Networks , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).
[4] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[5] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[6] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[7] Sebnem Baydere,et al. Network capacity analysis for code propagation in Wireless Sensor Networks , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[8] Taha Landolsi,et al. Energy consumption considerations in dynamic wireless sensor networks with nodes and base stations mobility , 2010, Int. J. Sens. Networks.
[9] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[10] Victor C. M. Leung,et al. Mobile Agent Based Wireless Sensor Networks , 2006, J. Comput..
[11] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[12] Tatsuhiro Tsuchiya,et al. A self-organising algorithm for sensor placement in wireless mobile microsensor networks , 2008, Int. J. Wirel. Mob. Comput..
[13] L M Patnaik,et al. Resilience Key Predistribution Scheme using Asymmetric Matrices for Wireless Sensor Networks , 2009, 2009 IEEE International Advance Computing Conference.
[14] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[15] Krishna R. Narayanan,et al. Weakly Secure Network Coding , 2005 .
[16] Jörg Widmer,et al. Network coding: an instant primer , 2006, CCRV.
[17] Xinrong Li. Collaborative multi-sensor tracking in mobile wireless sensor networks , 2010, Int. J. Sens. Networks.
[18] Judith Kelner,et al. Evaluation of security mechanisms in wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).
[19] João Barros,et al. A Network Coding Approach to Secret Key Distribution , 2008, IEEE Transactions on Information Forensics and Security.
[20] Debao Xiao,et al. Secure-SPIN: Secure Sensor Protocol for Information via Negotiation for Wireless Sensor Networks , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.
[21] Chu-Sing Yang,et al. A cell-based sensor deployment strategy with improved coverage for mobility-assisted hybrid wireless sensor networks , 2010, Int. J. Ad Hoc Ubiquitous Comput..
[22] Kuo-Feng Ssu,et al. A moving algorithm for non-uniform deployment in mobile sensor networks , 2008, Mobility '08.