Clique-based group key assignment in Wireless Sensor Networks
暂无分享,去创建一个
Jie Wu | Minglu Li | Feng Li | Avinash Srinivasan | Jie Wu | Feng Li | Minglu Li | A. Srinivasan
[1] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[2] Jie Wu,et al. Distributed Reputation-based Secure Localization in Sensor Networks , 2006 .
[3] Jie Wu,et al. Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .
[4] Aldar C.-F. Chan,et al. Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[5] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[6] Rolf Niedermeier,et al. Data reduction and exact algorithms for clique cover , 2009, JEAL.
[7] Dhiraj K. Pradhan,et al. A cluster-based approach for routing in dynamic networks , 1997, CCRV.
[8] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[9] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[10] S. Buchegger,et al. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .
[11] David Hutchison,et al. EHBT: An Efficient Protocol for Group Key Management , 2001, Networked Group Communication.
[12] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[13] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[14] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[15] B SrivastavaMani,et al. Reputation-based framework for high integrity sensor networks , 2008 .
[16] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[17] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[18] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[19] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[20] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[21] Jean-Yves Le Boudec,et al. Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[22] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[23] Minglu Li,et al. CAGE: Clique-based Assignment of Group kEy , 2007, 2007 Second International Conference on Communications and Networking in China.
[24] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[25] Jean-Yves Le Boudec,et al. A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.