Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks
暂无分享,去创建一个
Honggang Wang | Sriram Chellappan | Xiaole Bai | Wenjun Gu | Honggang Wang | Xiaole Bai | Wenjun Gu | Sriram Chellappan
[1] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[2] R. Poovendran,et al. A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[3] A. S. Poornima,et al. Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks , 2009 .
[4] Deep Medhi,et al. A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[5] Xun Wang,et al. Analyzing the secure overlay services architecture under intelligent DDoS attacks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[6] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[7] Donggang Liu,et al. Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.
[8] Takashi Ito,et al. A key pre-distribution scheme for secure sensor networks using probability density function of node deployment , 2005, SASN '05.
[9] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[10] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[11] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[12] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[13] Yongdae Kim,et al. Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.
[14] Yunho Lee,et al. A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks , 2009, ArXiv.
[15] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[16] Deep Medhi,et al. Source routing based pairwise key establishment protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[17] Kwangjo Kim,et al. State-based key management scheme for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[18] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[19] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[20] Dharma P. Agrawal,et al. Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[21] Roberto Di Pietro,et al. Efficient and resilient key discovery based on pseudo-random key pre-deployment , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[22] Thomas F. La Porta,et al. Establishing Pair-Wise Keys in Heterogeneous Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[23] Radha Poovendran,et al. A key management scheme in distributed sensor networks using attack probabilities , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[24] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[25] Anish Arora,et al. Analyzing the yield of ExScal, a large-scale wireless sensor network experiment , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).
[26] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[27] Faramarz Fekri,et al. Key pre-distribution in wireless sensor networks using multivariate polynomials , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[28] Taieb Znati,et al. Path key establishment using multiple secured paths in wireless sensor networks , 2005, CoNEXT '05.
[29] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[30] Ion Stoica,et al. Taming IP packet flooding attacks , 2004, Comput. Commun. Rev..
[31] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[32] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[33] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[34] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[35] Yong Guan,et al. A key pre-distribution scheme using deployment knowledge for wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[36] Chinya V. Ravishankar,et al. Efficient key establishment for group-based wireless sensor deployments , 2005, WiSe '05.
[37] Myong-Soon Park,et al. An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[38] Jiang Wu,et al. Product Construction of Key Distribution Schemes for Sensor Networks , 2004, Selected Areas in Cryptography.
[39] Dijiang Huang,et al. RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[40] Douglas R. Stinson,et al. Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.
[41] Douglas R. Stinson,et al. A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[42] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[43] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[44] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[45] Roberto Di Pietro,et al. Connectivity properties of secure wireless sensor networks , 2004, SASN '04.
[46] Arno Wacker,et al. A new approach for establishing pairwise keys for securing wireless sensor networks , 2005, SenSys '05.
[47] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[48] Nitin H. Vaidya,et al. Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[49] Min Wu,et al. Coordinated sensor deployment for improving secure communications and sensing coverage , 2005, SASN '05.
[50] J. Spencer. The Strange Logic of Random Graphs , 2001 .
[51] Brighten Godfrey,et al. OpenDHT: a public DHT service and its uses , 2005, SIGCOMM '05.
[52] Tian Bu,et al. Trading resiliency for security: model and algorithms , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[53] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[54] Venkatesh Sarangan,et al. Key management in wireless sensor networks with inter-network sensor roaming , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[55] Yuguang Fang,et al. LLK: a link-layer key establishment scheme for wireless sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[56] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[57] Faramarz Fekri,et al. Threshold Key-Establishment in Distributed Sensor Networks Using a Multivariate Scheme , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[58] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[59] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[60] Xun Wang,et al. On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks , 2006, IEEE Transactions on Parallel and Distributed Systems.