Key management systems for sensor networks in the context of the Internet of Things
暂无分享,去创建一个
Cristina Alcaraz | Rodrigo Roman | Javier López | Nicolas Sklavos | R. Román | Javier López | N. Sklavos | Cristina Alcaraz
[1] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[2] Hannes Tschofenig,et al. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) , 2005, RFC.
[3] Ralf Steinmetz,et al. Wireless Sensor Networks and the Internet of Things: Selected Challenges , 2009 .
[4] Vlad Trifa,et al. Sharing using social networks in a composable Web of Things , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[5] Elfed Lewis,et al. Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes , 2008 .
[6] Elfed Lewis,et al. A comparative review of wireless sensor network mote technologies , 2009, 2009 IEEE Sensors.
[7] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[8] Peter Friess,et al. Internet of Things Strategic Research Roadmap , 2011 .
[9] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[10] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[11] Yang Xiao,et al. Underwater Acoustic Sensor Networks , 2009 .
[12] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[13] William S. Dorn,et al. Generalizations of Horner's Rule for Polynomial Evaluation , 1962, IBM J. Res. Dev..
[14] Cristina Alcaraz,et al. A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[15] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[16] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[17] Dario Pompili,et al. Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.
[18] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[19] R Stanley Williams. A central nervous system for the earth. , 2009, Harvard business review.
[20] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.
[21] Claude Castelluccia,et al. TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.
[22] Paulo S. L. M. Barreto,et al. A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.
[23] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[24] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[25] Jerzy Jaworski,et al. Random key predistribution for wireless sensor networks using deployment knowledge , 2009, Computing.
[26] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[27] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[28] Chiara Petrioli,et al. Flexible key exchange negotiation for wireless sensor networks , 2010, WiNTECH '10.
[29] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[30] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[31] Ingrid Verbauwhede,et al. Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .
[32] Syed Obaid Amin,et al. A novel Intrusion Detection Framework for IP-based sensor networks , 2009, 2009 International Conference on Information Networking.
[33] Ricardo Dahab,et al. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.
[34] Srdjan Toljagic. IBM: A Smarter Planet , 2011 .
[35] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[36] Rodrigo Roman,et al. Integrating wireless sensor networks and the internet: a security analysis , 2009, Internet Res..
[37] Adrian Perrig,et al. SAKE: Software attestation for key establishment in sensor networks , 2008, Ad Hoc Networks.
[38] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..