暂无分享,去创建一个
[1] Bo Sheng,et al. Public-key based access control in sensornet , 2011, Wirel. Networks.
[2] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[3] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[4] Kyung-Ah Shim,et al. A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks , 2016, IEEE Communications Surveys & Tutorials.
[5] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[6] Jun Zhao,et al. On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks , 2017, IEEE Transactions on Information Forensics and Security.
[7] Giuseppe Piro,et al. Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption , 2017, IEEE Embedded Systems Letters.
[8] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[9] Leili Farzinvash,et al. Two-phase node deployment for target coverage in rechargeable WSNs using genetic algorithm and integer linear programming , 2020 .
[10] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[11] Majid Bayat,et al. LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT , 2021, Wirel. Networks.
[12] Anfeng Liu,et al. Data Collection in Underwater Sensor Networks based on Mobile Edge Computing , 2019, IEEE Access.
[13] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[14] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[15] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[16] Jie Huang,et al. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter , 2014, Sensors.
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] Ibrahim Nadir,et al. Establishing symmetric pairwise-keys using public-key cryptography in Wireless Sensor Networks (WSN) , 2016, 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
[19] David E. Culler,et al. The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.
[20] Hassan M. Elkamchouchi,et al. An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).
[21] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[22] Jing He,et al. A Survey on Public Key Mechanism in Wireless Sensor Networks , 2020 .
[23] Robert H. Deng,et al. Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..
[24] Fagen Li,et al. AKAIoTs: authenticated key agreement for Internet of Things , 2019, Wirel. Networks.
[25] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[26] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[27] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[28] Ki-Hyung Kim,et al. A Reliable and Secure Hybrid Key Management Scheme for WSNs , 2015 .
[29] Hairong Qi,et al. A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[30] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[31] Radha Poovendran,et al. Mitigation of Control Channel Jamming under Node Capture Attacks , 2009, IEEE Transactions on Mobile Computing.
[32] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[33] Elisa Bertino,et al. Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.
[34] Michael D. Smith,et al. Implementing public-key infrastructure for sensor networks , 2008, TOSN.
[35] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[36] Anfeng Liu,et al. A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues , 2019, Ad Hoc Sens. Wirel. Networks.
[37] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.