Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Secure Data Aggregation in Wireless Sensor Networks , 2008 .
[2] Mohamed Eltoweissy,et al. Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.
[3] T. Subash,et al. Novel key pre-distribution scheme in wireless sensor network , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.
[4] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[5] Xueping Li,et al. A Quantitative Survivability Evaluation Model for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.
[6] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[7] Quazi Mamun,et al. A Qualitative Comparison of Different Logical Topologies for Wireless Sensor Networks , 2012, Sensors.
[8] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[9] Yuguang Fang,et al. Securing sensor networks with location-based keys , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[10] F. Kausar,et al. A Random Key Distribution Scheme for Securing Wireless Sensor Network , 2006, 2006 IEEE International Multitopic Conference.
[11] Wen Qiao-Yan,et al. Secure Pairwise Key Establishment for Key Predistribution in Wireless Sensor Networks , 2012, 2012 International Conference on Computer Science and Service System.
[12] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[13] Anastasios A. Economides,et al. Wireless sensor network security visualization , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.
[14] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[15] Said E. El-Khamy,et al. New low complexity key exchange and encryption protocols for wireless sensor networks clusters based on Elliptic Curve Cryptography , 2009, 2009 National Radio Science Conference.
[16] Jian Wang,et al. Key Sharing in Hierarchical Wireless Sensor Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[17] G. Varaprasad,et al. Dynamic key management method for wireless sensor networks , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).
[18] Srinivas Sampalli,et al. A Hybrid Key Management Protocol for Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[19] Honggang Wang,et al. Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.
[20] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[21] Yang Yang,et al. A novel key management scheme for hierarchical wireless sensor networks , 2010, 2010 IEEE 12th International Conference on Communication Technology.
[22] Esam A. A. A. Hagras,et al. Energy efficient key management scheme based on elliptic curve signcryption for Wireless Sensor Networks , 2011, 2011 28th National Radio Science Conference (NRSC).
[23] Stephan Olariu,et al. Group key management scheme for large-scale sensor networks , 2005, Ad Hoc Networks.
[24] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[25] Donggang Liu,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.
[26] Srinivas Sampalli,et al. A robust pair-wise and group key management protocol for wireless sensor network , 2010, 2010 IEEE Globecom Workshops.
[27] Dong-Jo Park,et al. Security-enhanced key establishment schemes using network coding , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).
[28] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[29] Kanwalinderjit Kaur Gagneja. Pairwise post deployment key management scheme for heterogeneous sensor networks , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[30] Chen Liqing,et al. A New Key Management Protocol for Wireless Sensor Network , 2012, 2012 International Conference on Computer Science and Service System.
[31] Wenqi Yu. A Promising Pairwise Key Establishment Scheme for Wireless Sensor Networks in Hostile Environments , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[32] Yun Pan,et al. Simulation of Key Management Protocol in Wireless Sensor Networks , 2009, 2009 International Joint Conference on Computational Sciences and Optimization.
[33] Hung-Min Sun,et al. A Pair-wise Key Establishment for Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[34] Javier López,et al. Unleashing public-key cryptography in wireless sensor networks , 2006, J. Comput. Secur..
[35] Wenjing Lou,et al. Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks , 2008, IEEE Transactions on Wireless Communications.