WSN의 에너지 효율적 운영을 위한 신뢰성이 보장된 IDE-LEACH 프로토콜
暂无分享,去创建一个
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Eui-nam Huh,et al. An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network , 2008, ICUIMC '08.
[3] Sang-Ho Lee,et al. An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment , 2012 .
[4] Bo-Seung Kim,et al. A Study on Node Authentication Mechanism using Sensor Node's Energy Value in WSN , 2011 .
[5] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[6] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Jung-Bong Suk,et al. Improvement of Energy Efficiency of LEACH Protocol for Wireless Sensor Networks , 2008 .
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Wen-Shenq Juang,et al. Efficient User Authentication and Key Agreement in Wireless Sensor Networks , 2006, WISA.
[11] Jang-Woo Kwon,et al. Algorithm Improving Network Life-time Based on LEACH Protocol , 2010 .
[12] Chunming Rong,et al. Identity-based key agreement and encryption for wireless sensor networks , 2006 .
[13] Jae-Hak Chung,et al. An Active Interference Management Scheme for Cognitive Radio Systems , 2013 .