Non-threshold Deterministic Parwise Key Establishment Scheme for Clustered Distributed Sensor Networks
暂无分享,去创建一个
[1] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[2] Donggang Liu,et al. Detecting Misused Keys in Wireless Sensor Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[3] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[4] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[5] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[6] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[7] Man Young Rhee,et al. Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .
[8] Radha Poovendran,et al. A key management scheme in distributed sensor networks using attack probabilities , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[9] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[10] Tyler Moore. A collusion attack on pairwise key predistribution schemes for distributed sensor networks , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[11] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[12] Hideki Imai,et al. On the Key Predistribution System: A Practical Solution to the Key Distribution Problem , 1987, CRYPTO.
[13] TranThanh Dai,et al. Efficient ID-Based Threshold Random Key Pre-Distribution Scheme for Wireless Sensor Networks , 2008, IEICE Trans. Commun..
[14] Huirong Fu,et al. Replication attack on random key pre-distribution schemes for wireless sensor networks , 2005 .
[15] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[16] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .