Factors Impacting Key Management Effectiveness in Secured Wireless Networks

Abstract : The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This research seeks to identify best practices in securing networks which may be applied to new network architectures.

[1]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[2]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[3]  Robin Kravets,et al.  Composite key management for ad hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[4]  T.A. Gulliver,et al.  Hierarchical key management for mobile ad-hoc networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[5]  Paul Sass Communications networks for the Force XXI Digitized Battlefield , 1999, Mob. Networks Appl..

[6]  Jinwoo Park,et al.  An implementation of wireless sensor network , 2004, IEEE Trans. Consumer Electron..

[7]  Linda Doyle,et al.  Ad hoc key management infrastructure , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[8]  Sushil Jajodia,et al.  An authorization model for a public key management service , 2001, TSEC.

[9]  Jie Wu,et al.  Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[10]  N. Asokan,et al.  Key agreement in ad hoc networks , 2000, Comput. Commun..

[11]  Tolga Acar,et al.  Security Domains: Key Management in Large-Scale Systems , 2000, IEEE Software.

[12]  Avishai Wool,et al.  Key management for restricted multicast using broadcast encryption , 2000, TNET.

[13]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[14]  Lemin Li,et al.  Research and analysis on routing protocols for wireless sensor networks , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..

[15]  Shouhuai Xu On the security of group communication schemes based on symmetric key cryptosystems , 2005, SASN '05.

[16]  Sumita Mishra,et al.  Analysis of a hybrid key management solution for ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[17]  Deep Medhi,et al.  Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.

[18]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[19]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[20]  Bertil Svensson,et al.  Capacity limitations in wireless sensor networks , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).

[21]  Liviu Iftode,et al.  Locality driven key management architecture for mobile ad-hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[22]  F. J. Adamouski Encryption technology other than PKI , 1998, Proceedings IEEE 32nd Annual 1998 International Carnahan Conference on Security Technology (Cat. No.98CH36209).

[23]  Mohamed Eltoweissy,et al.  SECK: survivable and efficient clustered keying for wireless sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[24]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[25]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[26]  Jing Liu,et al.  Secure Routing for Mobile Ad Hoc Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[27]  W.A. Jansen A second look at the SDNS key management protocol , 1993, Proceedings of 9th Annual Computer Security Applications Conference.

[28]  Kwangjo Kim,et al.  State-based key management scheme for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[29]  Ozkan M. Erdem EDKM: efficient distributed key management for mobile ad hoc networks , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).

[30]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[31]  Serge Vaudenay,et al.  Cryptography with Guardian Angels: Bringing civilization to pirates - Abstract , 2003 .

[32]  Wang Yi-jun Key Management in Mobile Ad Hoc Network , 2009 .

[33]  Luiz A. DaSilva,et al.  Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.

[34]  Luca Salgarelli,et al.  Smart PSK provisioning: a key-management and authentication scheme for wireless LANs , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[35]  Byrav Ramamurthy,et al.  CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[36]  G. Keppel Practical research: Planning and design 2nd ed. , 1980 .

[37]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[38]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[39]  Randy H. Katz,et al.  Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.

[40]  He Ge An efficient key management scheme for pervasive computing , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[41]  Telecommunications Board Cryptography's Role in Securing the Information Society , 1996 .

[42]  Shon Harris,et al.  CISSP Certification All-in-One Exam Guide , 2002 .

[43]  Ashutosh Saxena,et al.  Hierarchical key management scheme using polynomial interpolation , 2005, OPSR.

[44]  Ali Bakirdan,et al.  Security algorithms in wireless LAN: proprietary or nonproprietary , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[45]  Chinya V. Ravishankar,et al.  Efficient key establishment for group-based wireless sensor deployments , 2005, WiSe '05.

[46]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[47]  Diane Kiwior,et al.  Key management for secure multicast group communication in mobile networks , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[48]  D. K. Branstad,et al.  Policy-based cryptographic key management: experience with the KRP project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[49]  Houda Labiod,et al.  KMS: a key management system for multi-provider interconnected Wi-Fi WLANs , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[50]  Stephan Olariu,et al.  Scalable cryptographic key management in wireless sensor networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[51]  William T. Polk,et al.  Public Key Infrastructures that Satisfy Security Goals , 2003, IEEE Internet Comput..

[52]  Kia Makki,et al.  Dynamic key management for secure routing in LCMRMG MANET , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).

[53]  J. Giordano,et al.  Fine-grained, scalable, and secure key management scheme for trusted military message systems , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[54]  Dong Hoon Lee,et al.  Secure and efficient key management for dynamic multicast groups , 2001, OPSR.

[55]  Ingrid Verbauwhede,et al.  Reducing radio energy consumption of key management protocols for wireless sensor networks , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).

[56]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.

[57]  William A. Arbaugh,et al.  Wireless Network Security and Interworking , 2006, Proceedings of the IEEE.

[58]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[59]  Sushil Jajodia,et al.  Efficient and secure keys management for wireless mobile communications , 2002, POMC '02.

[60]  Fei Hu,et al.  Robust security in large-scale wireless actuator and sensor networks: a low energy two-level implementation , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..

[61]  Constantine N. Manikopoulos,et al.  Architecture of the mobile ad-hoc network security (MANS) system , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[62]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[63]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[64]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[65]  Danai Patiyoot Security issues for wireless ATM networks , 2002, OPSR.

[66]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[67]  Abhrajit Ghosh,et al.  Last hop topology sensitive multicasting key managment , 2005, Q2SWinet '05.

[68]  K. J. Ray Liu,et al.  An efficient key management scheme for secure wireless multicast , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[69]  Marina Blanton,et al.  Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.

[70]  Mohamed F. Younis,et al.  Lightweight key management for wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[71]  I. Sasase,et al.  On demand distributed public key management for wireless ad hoc networks , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..

[72]  Malur K. Sundareshan,et al.  Secure communication in internet environments: a hierarchical key management scheme for end-to-end encryption , 1989, IEEE Trans. Commun..

[73]  Vaduvur Bharghavan Secure wireless LANs , 1994, CCS '94.

[74]  Yuh-Min Tseng A scalable key-management scheme with minimizing key storage for secure group communications , 2003, Int. J. Netw. Manag..

[75]  W.A. Arbaugh Wireless Security Is Different , 2003, Computer.

[76]  N. Denzin,et al.  The discipline and practice of qualitative research [Introduction]. Denzin & Y. S. Lincoln (Eds.), The handbook of qualitative research (2nd ed. , 2000 .

[77]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[78]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[79]  Lein Harn,et al.  Key management for decentralized computer network services , 1993, IEEE Trans. Commun..

[80]  Zhang Shiyong,et al.  Securing ad hoc networks through mobile agent , 2004, InfoSecu '04.

[81]  Mohamed F. Younis,et al.  A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[82]  S. Srinivasan,et al.  Mobile ad hoc network security - a taxonomy , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[83]  Avishai Wool Key management for encrypted broadcast , 1998, CCS '98.

[84]  A. Yasinsac,et al.  Ad hoc network security: peer identification and authentication using signal properties , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[85]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[86]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[87]  Theodoulos Garefalakis,et al.  Public key infrastructure in mobile systems , 2002 .

[88]  Peter Gutmann,et al.  Simplifying public key management , 2004, Computer.

[89]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[90]  Donggang Liu,et al.  Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.

[91]  Takashi Ito,et al.  A key pre-distribution scheme for secure sensor networks using probability density function of node deployment , 2005, SASN '05.

[92]  Emil C. Lupu,et al.  Towards flexible credential verification in mobile ad-hoc networks , 2002, POMC '02.

[93]  Stephan Olariu,et al.  ANSWER: autonomous wireless sensor network , 2005, Q2SWinet '05.

[94]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[95]  D. O'Mahony,et al.  Shared RSA key generation in a mobile ad hoc network , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[96]  William A. Arbaugh,et al.  Security problems in 802.11-based networks , 2003, CACM.

[97]  Yong Guan,et al.  A robust group-based key management scheme for wireless sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[98]  T. Andrew Yang,et al.  Wireless LAN security and laboratory designs , 2004 .

[99]  Hamdy S. Soliman,et al.  Application of synchronous dynamic encryption system in mobile wireless domains , 2005, Q2SWinet '05.

[100]  Xiao Chen,et al.  An efficient key management scheme in hierarchical sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[101]  Yuguang Fang,et al.  AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[102]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[103]  Stephan Olariu,et al.  Common data security network (CDSN) , 2005, Q2SWinet '05.

[104]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[105]  Peng Liu,et al.  Localized public-key management for mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[106]  Mohammed Atiquzzaman,et al.  Wireless sensor network for aircraft health monitoring , 2004, First International Conference on Broadband Networks.

[107]  Virtual Bridged,et al.  IEEE Standards for Local and Metropolitan Area Networks: Specification for 802.3 Full Duplex Operation , 1997, IEEE Std 802.3x-1997 and IEEE Std 802.3y-1997 (Supplement to ISO/IEC 8802-3: 1996/ANSI/IEEE Std 802.3, 1996 Edition).

[108]  R. Mollin RSA and Public-Key Cryptography , 2002 .

[109]  Izak Benbasat,et al.  The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..

[110]  Ozkan M. Erdem Efficient self-organized key management for mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[111]  Benny Pinkas Efficient state updates for key management , 2004, Proceedings of the IEEE.

[112]  Levente Buttyán,et al.  Report on a working session on security in wireless ad hoc networks , 2003, MOCO.

[113]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[114]  Steve F. Russe Wireless Network Security for Users , 2001, ITCC.

[115]  Lei Wang,et al.  Researches on scheme of pairwise key establishment for distributed sensor networks , 2005, WMuNeP.

[116]  Johann van der Merwe,et al.  Fully self-organized peer-to-peer key management for mobile ad hoc networks , 2005, WiSe '05.

[117]  Kimberly A. Neuendorf,et al.  The Content Analysis Guidebook , 2001 .

[118]  Bernd Becker,et al.  Securing wireless networks in a university environment , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[119]  Qiong Zhang,et al.  A centralized key management scheme for hierarchical access control , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[120]  Jan M. Rabaey,et al.  PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking , 2000, Computer.

[121]  George C. Hadjichristofi,et al.  A framework for key management in mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[122]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[123]  Xiang-Yang Li,et al.  Efficient hybrid key agreement protocol for wireless ad hoc networks , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.

[124]  M. Brownfield,et al.  Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[125]  Peter G. Neumann Crypto key management , 1997, CACM.

[126]  Matthew K. Franklin,et al.  The Ω key management service , 1996, CCS '96.

[127]  Chen Junliang,et al.  Secret key management based on variable authentication code in UPT system , 1998, ICCT'98. 1998 International Conference on Communication Technology. Proceedings (IEEE Cat. No.98EX243).

[128]  Tom A. M. Kevenaar,et al.  A security design for a general purpose, self-organizing, multihop ad hoc wireless network , 2003, SASN '03.

[129]  Klaus Krippendorff,et al.  Content Analysis: An Introduction to Its Methodology , 1980 .

[130]  K. J. Ray Liu,et al.  Topology-aware key management schemes for wireless multicast , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[131]  Qijun Gu,et al.  KTR: an efficient key management scheme for air access control , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[132]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[133]  R. Stake The art of case study research , 1995 .

[134]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[135]  J. Morland,et al.  A Case for the Case Study , 1991 .

[136]  Ranga S. Ramanujan,et al.  Techniques for intrusion-resistant ad hoc routing algorithms (TIARA) , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[137]  Jyh-Cheng Chen,et al.  Wireless LAN security and IEEE 802.11i , 2005, IEEE Wireless Communications.

[138]  Mohamed F. Younis,et al.  Key management in wireless ad hoc networks: collusion analysis and prevention , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[139]  Radha Poovendran,et al.  A key management scheme in distributed sensor networks using attack probabilities , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[140]  Bart Preneel,et al.  The wandering nodes: key management for low-power mobile ad hoc networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[141]  E. L. Witzke,et al.  Key management for large scale end-to-end encryption , 1994, 1994 Proceedings of IEEE International Carnahan Conference on Security Technology.

[142]  Robin Kravets,et al.  Key management for heterogeneous ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[143]  Jukka Valkonen Key Management in Ad-Hoc Networks , 2007 .

[144]  Wen Song,et al.  An Efficient Key Management Scheme for Secure Sensor Networks , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).

[145]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[146]  Walter Fumy,et al.  Principles of Key Management , 1993, IEEE J. Sel. Areas Commun..

[147]  K. Passerini,et al.  Wireless network security - a discussion from a business perspective , 2005, Symposium, 2005 Wireless Telecommunications.

[148]  Jalel Ben-Othman,et al.  Data security in ad hoc networks using multipath routing , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[149]  Jeff Wilson,et al.  Securing a wireless network , 2002, SIGUCCS '02.

[150]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[151]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[152]  Don Davis Compliance Defects in Public Key Cryptography , 1996, USENIX Security Symposium.

[153]  Mahalingam Ramkumar,et al.  An efficient key predistribution scheme for ad hoc network security , 2005, IEEE Journal on Selected Areas in Communications.

[154]  Anthony M. Townsend,et al.  Why Wi-Fi wants to be free , 2003, CACM.

[155]  A. Price,et al.  A key pre-distribution scheme for wireless sensor networks , 2005, Symposium, 2005 Wireless Telecommunications.

[156]  Aura Ganz,et al.  Security protocol for IEEE 802.11 wireless local area network , 1998, Mob. Networks Appl..

[157]  J. Martin Leo Manickam,et al.  Secure routing protocol for mobile ad-hoc networks , 2007, SCSC.

[158]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[159]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[160]  Haiyun Luo,et al.  Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .

[161]  Chu-Hsing Lin,et al.  An efficient hierarchical key management scheme using symmetric encryptions , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[162]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.

[163]  Aldar C.-F. Chan,et al.  Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[164]  Jim Binkley,et al.  Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems , 2001, Wirel. Networks.

[165]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[166]  Winston M. Tellis,et al.  APPLICATION OF A CASE STUDY METHODOLOGY , 1997 .

[167]  Ashok K. Agrawala,et al.  Performance of IEEE 802.11 based wireless sensor networks in noisy environments , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[168]  Fei Hu,et al.  Security in wireless actor & sensor networks (WASN): towards a hierarchical re-keying design , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[169]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[170]  K. J. Ray Liu,et al.  A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.

[171]  Mohamed Eltoweissy,et al.  TKGS: verifiable threshold-based key generation scheme in open wireless ad hoc networks , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).

[172]  Paul G. Comba Approaches to cryptographic key management , 1986, PCS '86.

[173]  Amy B. Woszczynski,et al.  Proceedings of the 1st annual conference on Information security curriculum development , 2004 .

[174]  Michael S Lewis-Beck,et al.  Sage university papers. Series Quantitative applications in the social sciences , 2008 .

[175]  Yi Yang,et al.  An overview of Wireless Sensor Network and applications , 2003, Proceedings of the 35th Southeastern Symposium on System Theory, 2003..

[176]  Mehmet Ulema,et al.  Wireless sensor networks: architectures, protocols, and management , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).

[177]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[178]  Anup Kumar,et al.  A framework for integrated Internet and ad hoc network security , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).

[179]  ChenJyh-Cheng,et al.  Wireless LAN security and IEEE 802.11i , 2005 .

[180]  Simon J. Shepherd,et al.  Cryptographic security Techniques for wireless networks , 1999, OPSR.

[181]  Jianhua Li,et al.  Combinatorial optimization for wireless sensor networks , 2005, Proceedings of 2005 IEEE International Workshop on VLSI Design and Video Technology, 2005..