A survey on key management mechanisms for distributed Wireless Sensor Networks
暂无分享,去创建一个
Paulo S. L. M. Barreto | Marcos A. Simplício | Cintia B. Margi | Tereza Cristina M. B. Carvalho | M. Simplício | T. Carvalho | C. Margi | Paulo L. Barreto
[1] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[2] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[3] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[4] Donggang Liu,et al. Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.
[5] Albert Levi,et al. A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks , 2009, Q2SWinet '09.
[6] M. Dehghan,et al. Key Management Mechanisms in Wireless Sensor Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[9] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[10] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[11] Xingming Sun,et al. An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge , 2009, Comput. Commun..
[12] Ingrid Verbauwhede,et al. Energy-Memory-Security Tradeoffs in Distributed Sensor Networks , 2004, ADHOC-NOW.
[13] Laurence T. Yang,et al. Key predistribution scheme using keyed-hash chain and multipath key reinforcement for wireless sensor networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[14] Robin Kravets,et al. Improving Energy Conservation Using Bulk Transmission over High-Power Radios in Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[15] T Beth,et al. Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques , 1985 .
[16] Bülent Yener,et al. Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.
[17] Donggang Liu,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.
[18] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[19] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[20] Hangyang Dai,et al. Triangle-based key management scheme for wireless sensor networks , 2009 .
[21] Jinshu Su,et al. A Loop-Based Key Management Scheme for Wireless Sensor Networks , 2007, EUC Workshops.
[22] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[23] Chinya V. Ravishankar,et al. Efficient key establishment for group-based wireless sensor deployments , 2005, WiSe '05.
[24] Ingrid Verbauwhede,et al. Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .
[25] Suresh Singh,et al. Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[26] Thomas F. La Porta,et al. The effects of probabilistic key management on secure routing in sensor networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[27] Albert Levi,et al. A resilient key predistribution scheme for multiphase wireless sensor networks , 2009, 2009 24th International Symposium on Computer and Information Sciences.
[28] Claude Castelluccia,et al. RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[29] Young-Koo Lee,et al. Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[30] Michael Scott,et al. On the application of pairing based cryptography to wireless sensor networks , 2009, WiSec '09.
[31] Abhishek Gupta,et al. Deterministic schemes for key distribution in wireless sensor networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[32] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[33] Kay Römer,et al. Wireless sensor networks: a new regime for time synchronization , 2003, CCRV.
[34] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[35] S. Manesis,et al. A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..
[36] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[37] Jianzhong Li,et al. Data Sampling Control and Compression in Sensor Networks , 2005, MSN.
[38] S. Yau. Mathematics and its applications , 2002 .
[39] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[40] J. Spencer. The Strange Logic of Random Graphs , 2001 .
[41] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[42] Donggang Liu,et al. Group-based key predistribution for wireless sensor networks , 2008, TOSN.
[43] Chuan-Ming Liu,et al. Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[44] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[45] Sun,et al. Review of Key Management Mechanisms in Wireless Sensor Networks , 2006 .
[46] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[47] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[48] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[49] Mohamed Ibnkahla,et al. Wireless sensor networks: Applications and challenges , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.
[50] Young-Koo Lee,et al. HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).
[51] Jolyon Clulow,et al. Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks , 2007, SEC.
[52] Paolo Santi. Topology control in wireless ad hoc and sensor networks , 2005 .
[53] Yongdae Kim,et al. Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.
[54] Adrian Perrig,et al. Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes , 2007, SenSys '07.
[55] Bruno Dutertre,et al. Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .
[56] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[57] Yu-Kwong Kwok,et al. A Novel Key Redistribution Scheme for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[58] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[59] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[60] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[61] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[62] I. Anderson. Combinatorial Designs: Construction Methods , 1990 .
[63] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[64] Vijay Varadharajan,et al. Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..
[65] Rung Ching Chen,et al. Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).
[66] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[67] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[68] Jaydip Sen,et al. An Efficient Certificate Authority for Ad Hoc Networks , 2007, ICDCIT.
[69] Yong Guan,et al. A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks , 2008, IEEE Transactions on Parallel and Distributed Systems.
[70] Douglas R. Stinson,et al. Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.
[71] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[72] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[73] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[74] Dong Hoon Lee,et al. Classification of Key Management Schemes for Wireless Sensor Networks , 2007, APWeb/WAIM Workshops.
[75] Ding-Zhu Du,et al. New constructions on broadcast encryption key pre-distribution schemes , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[76] Pierre-Louis Cayrel,et al. A New Efficient Threshold Ring Signature Scheme Based on Coding Theory , 2008, IEEE Transactions on Information Theory.