Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[2] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[5] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[6] Michael R. Beauregard,et al. The Basic Tools , 1992 .
[7] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[8] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[9] Mani B. Srivastava,et al. Computation Hierarchy for In-Network Processing , 2003, WSNA '03.
[10] Randy H. Katz,et al. Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.
[11] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[12] Stephan Olariu,et al. Group key management scheme for large-scale sensor networks , 2005, Ad Hoc Networks.
[13] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[14] Stephan Olariu,et al. Wireless sensor networks: leveraging the virtual infrastructure , 2004, IEEE Network.
[15] Ravi Prakash,et al. Max-min d-cluster formation in wireless ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[16] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[17] Roberto Di Pietro,et al. Efficient and resilient key discovery based on pseudo-random key pre-deployment , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[18] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[19] Richard E. Overill,et al. Foundations of Cryptography: Basic Tools , 2002, J. Log. Comput..
[20] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[21] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[22] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[23] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[24] Sushil Jajodia,et al. Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.
[25] Roberto Di Pietro,et al. Connectivity properties of secure wireless sensor networks , 2004, SASN '04.
[26] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[27] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[28] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[29] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[30] Viktor K. Prasanna,et al. Optimizing a class of in-network processing applications in networked sensor systems , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[31] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[32] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[33] David L Adamy,et al. Ew 101: A First Course in Electronic Warfare , 2001 .
[34] Deborah Estrin,et al. Directed diffusion for wireless sensor networking , 2003, TNET.
[35] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[36] David E. Culler,et al. Supporting aggregate queries over ad-hoc wireless sensor networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.