An Efficient Authentication and Key Management Protocol for Hierarchical Ad Hoc Sensor Networks
暂无分享,去创建一个
[1] Yuguang Fang,et al. Scalable Link-Layer Key Agreement in Sensor Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[2] Boon-Chong Seet,et al. The Handbook of Ad Hoc Wireless Networks , 2002 .
[3] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[4] Yuguang Fang,et al. A Scalable Key Agreement Scheme for Large Scale Networks , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.
[5] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[6] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[7] Dipankar Raychaudhuri,et al. Routing protocols for self-organizing hierarchical ad-hoc wireless networks , 2003 .
[8] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[9] Yuguang Fang,et al. A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions , 2004 .
[10] Levente Buttyán,et al. Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.
[11] Qiang Huang,et al. An unbalanced key establishment scheme for heterogeneous wireless networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[12] P. Borwein,et al. Polynomials and Polynomial Inequalities , 1995 .
[13] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[14] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[15] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[16] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[18] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[19] Dejan Simic,et al. A Survey of Wireless Security , 2007, J. Comput. Inf. Technol..