Collaborative Key Exchange System Based on Chinese Remainder Theorem in Heterogeneous Wireless Sensor Networks
暂无分享,去创建一个
[1] Pil Joong Lee,et al. Exact Formulae for Resilience in Random Key Predistribution Schemes , 2012, IEEE Transactions on Wireless Communications.
[2] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[3] Chinya V. Ravishankar,et al. Supporting Secure Communication and Data Collection in Mobile Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[4] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[5] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[6] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[7] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[8] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[9] Mohammad S. Obaidat,et al. An Efficient and Secure Routing Protocol for Wireless Sensor Networks Using Multicasting , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[10] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.
[11] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[12] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[13] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[14] Utz Roedig,et al. Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.
[15] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[16] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[17] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[18] Houcine Chafouk,et al. Secure collaborative system in heterogenous wireless sensor networks , 2015 .
[19] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[20] Donald E. Eastlake rd. Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH) , 2005 .
[21] Jorge Sá Silva,et al. A secure interconnection model for IPv6 enabled wireless sensor networks , 2010, 2010 IFIP Wireless Days.
[22] Sourav Kanti Addya. Key Pre-Distribution in Wireless Sensor Networks , 2010 .
[23] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[24] Garth V. Crosby,et al. Implementing IPsec in Wireless Sensor Networks , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).
[25] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[26] Young-Joo Kim,et al. SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[27] K SharmilaBanu,et al. An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds , 2013 .
[28] Adi Shamir,et al. How to share a secret , 1979, CACM.
[29] Fernando Boavida,et al. Why is IPSec a viable option for wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[30] Pascal Thubert,et al. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.
[31] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[32] Philippas Tsigas,et al. ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System , 2009, NordSec.
[33] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[34] Douglas R. Stinson,et al. Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.
[35] Houcine Chafouk,et al. IKEv2 Authentication Exchange Model in NS-2 , 2014, 2014 International Symposium on Computer, Consumer and Control.
[36] Jingsha He,et al. Enabling end-to-end secure communication between wireless sensor networks and the Internet , 2012, World Wide Web.