A novel key pre-distribution approach for high security and efficiency using LU-decomposition of matrix
暂无分享,去创建一个
[1] Song Guo. A Compromise-Resilient Pair-wise Rekeying Protocol in Large-Scale Wireless Sensor Networks , 2010 .
[2] Subhamoy Maitra,et al. A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design , 2005, ISC.
[3] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[4] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.
[5] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[6] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[7] Huagang Xiong,et al. An Efficient Key Management Scheme for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[8] Radha Sankararajan,et al. Improved Key Predistribution Scheme in Wireless Sensor Networks Using Cell Splitting in Hexagonal Grid Based Deployment Model , 2009, Int. J. Distributed Sens. Networks.
[9] Paulo S. L. M. Barreto,et al. A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.
[10] Jianfeng Ma,et al. Asymmetric Key Pre-distribution Scheme for sensor networks , 2009, IEEE Trans. Wirel. Commun..
[11] Honggang Wang,et al. Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.
[12] Sarbari Mitra,et al. A Hierarchical Deterministic Key Pre-distribution for WSN Using Projective Planes , 2011, ADHOCNETS.
[13] Mohsen Guizani,et al. An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network , 2009, IEEE Transactions on Vehicular Technology.
[14] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[15] Saber Banihashemian,et al. A new key management scheme in heterogeneous wireless sensor networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[16] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[17] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[18] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[19] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[20] Naixue Xiong,et al. An energy-efficient scheme in next-generation sensor networks , 2010 .
[21] Heribert Baldus,et al. A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[22] Douglas R. Stinson,et al. On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.
[23] Yacine Challal,et al. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.
[24] Ingrid Verbauwhede,et al. Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .
[25] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[26] Hsiao-Hwa Chen,et al. Selecting key management schemes for WSN applications , 2012, Comput. Secur..
[27] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[28] Yue Qi,et al. An Efficient and Secure Key Management Scheme for Hierarchical Wireless Sensor Networks , 2012 .
[29] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[30] Pardeep Kumar,et al. An efficient key pre-distribution scheme for wireless sensor network using public key cryptography , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[31] J. Spencer. The Strange Logic of Random Graphs , 2001 .
[32] Farooq Anjum,et al. Location dependent key management in sensor networks without using deployment knowledge , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.
[33] Hee Yong Youn,et al. An Energy-Efficient MAC Protocol Employing Dynamic Threshold for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[34] Hee Yong Youn,et al. Tree-Based Clustering(TBC) for Energy Efficient Wireless Sensor Networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[35] Hermann de Meer,et al. Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..
[36] Jim Hefferon,et al. Linear Algebra , 2012 .
[37] Shuhua Wang,et al. K ey pre-distribution using combinatorial designs for wireless sensor networks , 2013 .
[38] David Joyner,et al. Linear Algebra with Applications , 1998 .
[39] Piotr Szczechowiak,et al. Practical Identity-Based Key Agreement For Secure Communication in Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[40] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.