Key Management Protocols for Wireless Sensor Networks Diplomarbeit

Declaration I declare that this submission is my own work and it does not contains material previously published or written by another person unless otherwise referenced or acknowledge .

[1]  Yee Wei Law,et al.  How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[2]  Ingrid Verbauwhede,et al.  Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .

[3]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[4]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[5]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[6]  Shiuh-Pyng Shieh,et al.  Adaptive Random Key Distribution Schemes for Wireless Sensor Networks , 2005 .

[7]  Deborah Estrin,et al.  Target classification and localization in habitat monitoring , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[8]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[9]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[10]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.

[11]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[12]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[13]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[14]  Samir Chatterjee,et al.  A Secure Key Management Scheme for Sensor Networks , 2004, AMCIS.

[15]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[16]  Matt Welsh,et al.  Monitoring volcanic eruptions with a wireless sensor network , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[17]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[18]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[19]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[20]  Kwangjo Kim,et al.  State-based key management scheme for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[21]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[22]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[23]  Deep Medhi,et al.  Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.

[24]  Issa M. Khalil,et al.  SECOS : Key Management for Scalable and Energy Efficient Crypto On Sensors , 2003 .

[25]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[26]  Ricardo Morla Vision of Congestion-Free Road Traffic and Cooperating Objects , 2005 .

[27]  Gyula Simon,et al.  Sensor network-based countersniper system , 2004, SenSys '04.

[28]  Ingrid Verbauwhede,et al.  Energy-Memory-Security Tradeoffs in Distributed Sensor Networks , 2004, ADHOC-NOW.

[29]  Yee Wei Law,et al.  A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.

[30]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[31]  Bruno Dutertre,et al.  Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .

[32]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..