Scalable and Low Overhead Watermarking Based Integrated Authentication and Encryption Scheme for Wireless Sensor Networks
暂无分享,去创建一个
[1] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[2] Qiang Liu,et al. High throughput and secure advanced encryption standard on field programmable gate array with fine pipelining and enhanced key expansion , 2015, IET Comput. Digit. Tech..
[3] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[4] Cheng-Chi Lee,et al. A Secure and Efficient One-time Password Authentication Scheme for WSN , 2017, Int. J. Netw. Secur..
[5] Özgür B. Akan,et al. Spectrum-aware and cognitive sensor networks for smart grid applications , 2012, IEEE Communications Magazine.
[6] Marco Zennaro,et al. On Real-Time Performance Evaluation of Volcano-Monitoring Systems With Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[7] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[8] Ashok Kumar Das,et al. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..
[9] Habib Youssef,et al. Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption , 2014, Wireless Personal Communications.
[10] Kamarulzaman Ab. Aziz,et al. Managing disaster with wireless sensor networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[11] Liu Yong-Min,et al. The Architecture and Characteristics of Wireless Sensor Network , 2009, 2009 International Conference on Computer Technology and Development.
[12] Peilin Hong,et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[13] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[14] Yuguang Fang,et al. Securing sensor networks with location-based keys , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[15] Joseph M. Hellerstein,et al. Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[16] Michalis Faloutsos,et al. Coping with packet replay attacks in wireless networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[17] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[19] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[20] Sipra Das Bit,et al. LoWaNA: low overhead watermark based node authentication in WSN , 2016, Wirel. Networks.
[21] C. Chellappan,et al. The Replication Attack in Wireless Sensor Networks: Analysis and Defenses , 2011 .
[22] Vijay Varadharajan,et al. A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks , 2010, MobiQuitous.
[23] Erik Persson. Energy Harvesting in Wireless Sensor Networks , 2019 .
[24] Judy E. O'Neill,et al. The role of ARPA in the development of the ARPANET, 1961-1972 , 1995, IEEE Ann. Hist. Comput..
[25] Wendi B. Heinzelman,et al. Water Quality Monitoring Using Wireless Sensor Networks , 2017 .
[26] Ping Wang,et al. On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions , 2014, Comput. Networks.
[27] Ting-Lan Lin,et al. VLSI Implementation of a Cost-Efficient Micro Control Unit With an Asymmetric Encryption for Wireless Body Sensor Networks , 2017, IEEE Access.
[28] Gerhard P. Hancke,et al. Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.
[29] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[30] Prosanta Gope,et al. A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.
[31] Kamlesh Gupta,et al. Security issues in wireless sensor networks , 2010 .
[32] Ebrahim A. Alrashed,et al. A Key Management Approach for Forward and Backward Secrecy in Unattended WSNs , 2017 .
[33] M. J. O'Driscoll,et al. Cooperative Engagement Capability , 1997 .
[34] Cheng-Chi Lee,et al. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks , 2013, Sensors.
[35] Jing Xu,et al. An efficient location-based compromise-tolerant key management scheme for sensor networks , 2011, Inf. Process. Lett..
[36] Roberto Di Pietro,et al. Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[37] Harsh K. Verma,et al. Authentication Protocol for Wireless Sensor Networks , 2010 .
[38] Jianfeng Ma,et al. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks , 2015, Peer-to-Peer Netw. Appl..
[39] Xiaodong Wang,et al. Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.
[40] Ajay Shekhar Pandey,et al. Key management in efficient and secure group communication , 2016, 2016 International Conference on Emerging Trends in Electrical Electronics & Sustainable Energy Systems (ICETEESES).
[41] Alexandre Yakovlev,et al. Efficient advanced encryption standard implementation using lookup and normal basis , 2009, IET Comput. Digit. Tech..
[42] Srikanta P. Kumar,et al. SensIT: Sensor Information Technology For the Warfighter , 2001 .