Key Management Schemes and Protocols for Wireless Sensor Networks
暂无分享,去创建一个
Su Zhong | Lin Chuang | Ren Fengyuan | Feng Fu-Jun | Lin Chuang | Ren Fengyuan | Sun Zhong | Feng Fu-jun
[1] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[4] Mohamed F. Younis,et al. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.
[5] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[6] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[7] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[8] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[9] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[10] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[11] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[12] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[13] Mohamed Eltoweissy,et al. A study of static versus dynamic keying schemes in sensor networks , 2005, PE-WASUN '05.
[14] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[15] A. Myers,et al. Global Environment for Network Innovations , 2005 .
[16] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[17] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[18] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[19] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[20] Satish Kumar,et al. Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.
[21] Chip Elliott,et al. GENI - global environment for network innovations , 2008, LCN.
[22] Panayiotis Kotzanikolaou,et al. Hybrid key establishment for multiphase self-organized sensor networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[23] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[24] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[25] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[26] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[27] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[28] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[29] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[30] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[31] Yongdae Kim,et al. Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.
[32] Yang Xiao,et al. Security in Sensor Networks , 2006 .
[33] Matthew K. Franklin,et al. Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[34] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[35] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[36] Mohamed Eltoweissy,et al. Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.
[37] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[38] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[39] Roberto Di Pietro,et al. Connectivity properties of secure wireless sensor networks , 2004, SASN '04.
[40] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[41] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[42] Mohamed Eltoweissy,et al. Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.
[43] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[44] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[45] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[46] Haiyun Luo,et al. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.
[47] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[48] Li Jian-Zhong,et al. Concepts, Issues and Advance of Sensor Networks and Data Management of Sensor Networks , 2003 .
[49] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[50] Sushil Jajodia,et al. Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[51] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.