The Novel Authentication Scheme Based on Theory of Quadratic Residues for Wireless Sensor Networks
暂无分享,去创建一个
Yun Liu | Zhen-Jiang Zhang | Chen-Xu Liu | Zi-Yao Cheng | Yun Liu | Zhenjiang Zhang | Zi-Yao Cheng | Chen-Xu Liu
[1] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[2] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[3] José María Sierra,et al. A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.
[4] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[5] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[6] Ingrid Verbauwhede,et al. Reducing radio energy consumption of key management protocols for wireless sensor networks , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).
[7] SzczerbickiEdward. SMART SYSTEMS INTEGRATION , 2008 .
[8] Ashok Kumar Das. Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks , 2012, Int. J. Netw. Secur..
[9] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[10] Felix C. Freiling,et al. Vulnerabilities and Attacks in Wireless Sensor Networks , 2008 .
[11] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[12] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[13] Yen-Ping Chu,et al. An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks , 2009 .
[14] Qijun Gu,et al. Analysis of area-congestion-based DDoS attacks in ad hoc networks , 2007, Ad Hoc Networks.
[15] Falko Dressler. Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..
[16] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[17] Hung-Min Sun,et al. Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems , 2008, 2009 Joint Conferences on Pervasive Computing (JCPC).
[18] Ted Taekyoung Kwon,et al. Experimental Study on Wireless Sensor Network Security , 2006, ISI.
[19] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[20] R. Poovendran,et al. Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[21] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[22] Rachid Beghdad,et al. Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.
[23] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[24] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[25] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[26] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[27] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[28] Chien-Hung Wu,et al. Improvement of the RFID authentication scheme based on quadratic residues , 2011, Comput. Commun..
[29] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[30] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[31] Dong Hoon Lee,et al. A Key Management Scheme for Large Scale Distributed Sensor Networks , 2006, PWC.