A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks
暂无分享,去创建一个
[1] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[2] Sushil Jajodia,et al. Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[3] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[4] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[5] Chin-Ling Chen,et al. Dynamic Session-Key Generation for Wireless Sensor Networks , 2008, EURASIP J. Wirel. Commun. Netw..
[6] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[7] V. Muthukkumarasamy,et al. A Minimal Protocol for Authenticated Key Distribution in Wireless Sensor Networks , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.
[8] Martina Zitterbart,et al. Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.
[9] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[10] Hannes Hartenstein,et al. Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers , 2005, ESAS.
[11] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[12] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[13] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[14] Donggang Liu,et al. Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks , 2003 .
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[18] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[19] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[20] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.
[21] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[22] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[23] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[24] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.