Cluster Based Dynamic Keying Technique for Authentication in Wireless Sensor Networks
暂无分享,去创建一个
[1] Albert Y. Zomaya,et al. Security Issues in Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).
[2] Karl N. Levitt,et al. iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[3] Shan Guo Quan,et al. Fast Data Aggregation Algorithm for Minimum Delay in Clustered Ubiquitous Sensor Networks , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[4] Yun Wang. Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[5] C.-S. Lu,et al. Constrained Function-Based Message Authentication for Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.
[6] Xiaofeng Han,et al. Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks , 2010, IEEE Trans. Mob. Comput..
[7] John A. Stankovic,et al. Probability grid: a location estimation scheme for wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[8] Zoran Bojkovic,et al. Some security trends over wireless sensor networks , 2008, ICC 2008.
[9] Jalel Ben-Othman,et al. REER: Robust and Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[10] Huang Jie,et al. A key-chain based key management scheme for heterogeneous sensor network , 2010 .
[11] Xiaotie Deng,et al. TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.
[12] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[13] Sarma B. K. Vrudhula,et al. A framework for battery-aware sensor management , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[14] Masaaki Shirase,et al. Efficient Implementation of Pairing-Based Cryptography on a Sensor Node , 2009, IEICE Trans. Inf. Syst..
[15] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[16] Joseph M. Hellerstein,et al. Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[17] Meikang Qiu,et al. Energy minimization for heterogeneous wireless sensor networks , 2009, J. Embed. Comput..
[18] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[19] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[20] Chin-Ling Chen,et al. Dynamic Session-Key Generation for Wireless Sensor Networks , 2008, EURASIP J. Wirel. Commun. Netw..
[21] Joel J. P. C. Rodrigues,et al. Improved robust user authentication scheme for wireless sensor networks , 2009, 2009 Fifth International Conference on Wireless Communication and Sensor Networks (WCSN).
[22] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[23] Raheem A. Beyah,et al. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[24] Adi Shamir,et al. How to share a secret , 1979, CACM.
[25] Joonsang Baek,et al. Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.