Trusted transport mode based cluster-merkle-tree for wireless sensor networks
暂无分享,去创建一个
Zhou Quan | Fu Gui | Deqin Xiao | Jiuhao Li
[1] Mohamed Eltoweissy,et al. Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.
[2] Wang Ruchuan,et al. Research of Layer-Cluster Key Management Scheme on Wireless Sensor Networks , 2006 .
[3] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[4] Anupam Joshi,et al. Secure sensor networks for perimeter protection , 2003, Comput. Networks.
[5] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[6] Scott Shenker,et al. Routing Algorithms for DHTs: Some Open Questions , 2002, IPTPS.
[7] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[8] Firdous Kausar,et al. Key Management and Secure Routing in Heterogeneous Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[9] Yang Bo. Gauss reputation framework for sensor networks , 2008 .
[10] Cong Wang,et al. A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[11] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[12] Shen Yang,et al. An Energy Efficient Clustering Protocol for Surveillance Sensor Networks , 2008 .
[13] Huirong Fu,et al. Analysis of key management in wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[14] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[15] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[16] Baohua Zhao,et al. Trust-Based LEACH Protocol for Wireless Sensor Networks , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[17] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[18] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[19] Quan Zhou,et al. Secure Routing Protocol Cluster-Gene-Based for Wireless Sensor Networks , 2009, 2009 First International Conference on Information Science and Engineering.
[20] Jiliang Zhou,et al. An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network , 2008, 2008 International Conference on Information and Automation.