Cluster based secure dynamic keying technique for heterogeneous mobile Wireless Sensor Networks
暂无分享,去创建一个
[1] K. Pradeepa,et al. Design and Implementation Issues of Clustering in Wireless Sensor Networks , 2012 .
[2] Kirusnapillai Selvarajah,et al. Heterogeneous Wireless Sensor Network for Transportation System Applications , 2011 .
[3] Joonsang Baek,et al. Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.
[4] Chen Zhigang,et al. A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks , 2010, 2010 International Forum on Information Technology and Applications.
[5] DAVID W. CARMAN,et al. New Directions in Sensor Network Key Management , 2005, Int. J. Distributed Sens. Networks.
[6] Andrei V. Gurtov,et al. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications , 2014, Sensors.
[7] Ozgur Koray Sahingoz,et al. Large scale wireless sensor networks with multi-level dynamic key management scheme , 2013, J. Syst. Archit..
[8] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[9] Dharma P. Agrawal,et al. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.
[10] Yookun Cho,et al. PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks , 2007, Comput. Commun..
[11] Fei Hu,et al. Scalable Security in Wireless Sensor and Actuator Networks ( WSANs ) , 2005 .
[12] Cong Wang,et al. A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[13] Sudhakar Radhakrishnan,et al. Cluster Based Dynamic Keying Technique for Authentication in Wireless Sensor Networks , 2012, IAIT 2012.
[14] H. Hassanein,et al. Stochastic modeling of distributed,dynamic,randomized clustering protocols for wireless sensor networks , 2004, Workshops on Mobile and Wireless Networking/High Performance Scientific, Engineering Computing/Network Design and Architecture/Optical Networks Control and Management/Ad Hoc and Sensor Networks/Compil.
[15] Maybin K. Muyeba,et al. Security issues in ambulatory wireless sensor networks (AWSN): security Vs mobility , 2009 .
[16] Stephan Olariu,et al. Scalable cryptographic key management in wireless sensor networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[17] Dharma P. Agrawal,et al. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[18] Tzung-Pei Hong,et al. An Improved Weighted Clustering Algorithm for Determination of Application Nodes in Heterogeneous Sensor Networks , 2011, J. Inf. Hiding Multim. Signal Process..
[19] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[20] Shu Yun Lim,et al. Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network , 2011, J. Ubiquitous Syst. Pervasive Networks.
[21] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[22] Song Mao,et al. Unequal clustering algorithm for WSN based on fuzzy logic and improved ACO , 2011 .
[23] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[24] Georgios Kambourakis,et al. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs , 2011, IEEE Communications Surveys & Tutorials.
[25] Özgür Erçetin,et al. On Security and Reliability Using Cooperative Transmissions in Sensor Networks , 2010, Mobile Networks and Applications.
[26] Rico Radeke,et al. Node Degree based Improved Hop Count Weighted Centroid Localization Algorithm , 2011, KiVS.
[27] Kuochen Wang,et al. Efficient localization in mobile wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[28] Mayank Singh,et al. Clustering Based on Node Density in Heterogeneous Under-Water Sensor Network , 2013 .
[29] Willy Susilo,et al. Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security , 2006, IACR Cryptol. ePrint Arch..
[30] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[31] Huifang Chen,et al. One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks , 2013, Ad Hoc Networks.
[32] WangShun-Sheng,et al. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011 .
[33] Jang-Won Lee,et al. An average velocity-based routing protocol with low end-to-end delay for wireless sensor networks , 2009, IEEE Communications Letters.
[34] M. Kumar,et al. Security issues in wireless sensor networks , 2017 .
[35] Thomas F. La Porta,et al. Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2007, IEEE Trans. Mob. Comput..
[36] Ricardo Dahab,et al. SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..
[37] Joonsang Baek,et al. Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.
[38] Ivan Stojmenovic,et al. Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs , 2011, 2011 Proceedings IEEE INFOCOM.
[39] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[40] Xuemin Shen,et al. Self-healing group key distribution with time-limited node revocation for wireless sensor networks , 2007, Ad hoc networks.
[41] Stephan Olariu,et al. Group key management scheme for large-scale sensor networks , 2005, Ad Hoc Networks.
[42] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[43] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[44] Dusit Niyato,et al. Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization , 2009, IEEE Journal on Selected Areas in Communications.
[45] Soumendra Nath Lahiri,et al. Security and performance analysis of a secure clustering protocol for sensor networks , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).
[46] Dharma P. Agrawal,et al. An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol , 2002, IEEE Trans. Parallel Distributed Syst..
[47] Raheem A. Beyah,et al. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[48] Sriram Chellappan,et al. Providing End-to-End Secure Communications in Wireless Sensor Networks , 2011, IEEE Transactions on Network and Service Management.
[49] R. B. Patel,et al. EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks , 2009, Comput. Commun..
[50] Takahiro Hara,et al. Wireless Sensor Network Technologies for the Information Explosion Era , 2012, Wireless Sensor Network Technologies for the Information Explosion Era.