Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks
暂无分享,去创建一个
[1] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[2] Qin Wang,et al. An Improved Key Management Scheme for Hierarchical Wireless Sensors Networks , 2014 .
[3] Sanjay Kumar Madria,et al. A secure hierarchical model for sensor network , 2004, SGMD.
[4] Jianwei Huang,et al. Re-examining Probabilistic Versus Deterministic Key Management , 2007, 2007 IEEE International Symposium on Information Theory.
[5] Paulo S. L. M. Barreto,et al. A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.
[6] Prasan Kumar Sahoo,et al. Efficient security mechanisms for the distributed wireless sensor networks , 2005, Third International Conference on Information Technology and Applications (ICITA'05).
[7] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[8] Sajid Hussain,et al. An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks , 2008 .
[9] Gang Hu,et al. Research and Improve on Secure Routing Protocols in Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.
[10] Parminder Singh,et al. An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN , 2013 .
[11] Ricardo Dahab,et al. SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..
[12] I. Mahgoub,et al. A Secure Hierarchical Routing Protocol for Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[13] Chee-Onn Chow,et al. A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[14] Vijay Varadharajan,et al. A New Security Scheme for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[15] Yue Qi,et al. A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks , 2013 .
[16] Soumendra Nath Lahiri,et al. Security and performance analysis of a secure clustering protocol for sensor networks , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).
[17] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[18] Othman Ibrahim,et al. Empirical Study on Secure Routing Protocols in Wireless Sensor Networks , 2010, Int. J. Adv. Comp. Techn..
[19] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[20] Baojiang Cui,et al. A Secure Hierarchical Key Management Scheme in Wireless Sensor Network , 2012, Int. J. Distributed Sens. Networks.
[21] Adi Shamir,et al. How to share a secret , 1979, CACM.
[22] Yuan Zhang,et al. A Cluster-Based Group Key Management Scheme for Wireless Sensor Networks , 2010, 2010 12th International Asia-Pacific Web Conference.
[23] Cong Wang,et al. A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[24] Yue Qi,et al. Efficient Hierarchical Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks , 2013 .
[25] T. Lalitha,et al. Energy Efficient Cluster Based key Management Technique for Wireless Sensor Networks , 2011 .
[26] Lein Harn,et al. Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2010, IEEE Transactions on Computers.
[27] Antonio Alfredo Ferreira Loureiro,et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.
[28] Sajal K. Das,et al. Group key distribution via local collaboration in wireless sensor networks , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[29] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[30] Sanjay Kumar Madria,et al. SecRout: a secure routing protocol for sensor networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[31] Yue Qi,et al. An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks , 2013, ArXiv.
[32] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[33] Yiying Zhang,et al. A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network , 2013, Int. J. Distributed Sens. Networks.
[34] Vijay Varadharajan,et al. Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..
[35] Yang Yang,et al. A novel key management scheme for hierarchical wireless sensor networks , 2010, 2010 IEEE 12th International Conference on Communication Technology.
[36] Huda B. Hubboub,et al. Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks , 2012 .
[37] Dharma P. Agrawal,et al. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.