SeGCom: A secure group communication mechanism in cluster-tree wireless sensor networks
暂无分享,去创建一个
A. Koubaa | M. Abid | O. Gaddour | M. Abid | A. Koubâa | Olfa Gaddour
[1] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[2] Philip Levis,et al. TinyOS Programming: Introduction , 2009 .
[3] Sanjay Kumar Madria,et al. A secure hierarchical model for sensor network , 2004, SGMD.
[4] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[5] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[6] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[7] Guohong Cao,et al. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[8] Rajiv Gandhi,et al. Minimizing broadcast latency and redundancy in ad hoc networks , 2003, MobiHoc '03.
[9] Weina Lu,et al. A Synchronous Detection of the Road Boundary and Lane Marking for Intelligent Vehicles , 2007 .
[10] Nuno Pereira,et al. Disseminating data using broadcast when topology is unknown , 2005, RTSS 2005.
[11] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[12] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[13] Byrav Ramamurthy,et al. Secure Group Communications Over Data Networks , 2004 .
[14] Zhiqiang Du,et al. Efficient Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[15] Jianhua Li,et al. ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[16] Sezaki Kaoru,et al. A Proposal of Secure Group Communication for Wireless Sensor Networks , 2003 .
[17] Ashok Kumar Das,et al. An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[18] Dong Hoon Lee,et al. A Key Distribution Scheme for Wireless Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[19] Zheng Yuan,et al. Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[20] Dharma P. Agrawal,et al. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.
[21] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[22] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[23] Lei Zhang,et al. Grouping-Based Clustering Routing Protocol in Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[24] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[25] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[26] Roberto Di Pietro,et al. Confidentiality and integrity for data aggregation in WSN using peer monitoring , 2009, Secur. Commun. Networks.
[27] Yong Wang,et al. Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.