Authentication in Wireless Sensor Networks Using Dynamic Keying Technique
暂无分享,去创建一个
[1] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[2] Yun Wang. Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[3] Joonsang Baek,et al. An efficient and scalable re-authentication protocol over wireless sensor network , 2011, IEEE Transactions on Consumer Electronics.
[4] Sudhakar Radhakrishnan,et al. Cluster Based Dynamic Keying Technique for Authentication in Wireless Sensor Networks , 2012, IAIT 2012.
[5] Junghyun Lee,et al. Energy Efficient Key Management Protocol in Wireless Sensor Networks , 2010 .
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Kirusnapillai Selvarajah,et al. Heterogeneous Wireless Sensor Network for Transportation System Applications , 2011 .
[8] Saber Banihashemian,et al. A new key management scheme in heterogeneous wireless sensor networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[9] Yong Guan,et al. A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks , 2008, IEEE Transactions on Parallel and Distributed Systems.
[10] Chun-Shien Lu,et al. Noninteractive Pairwise Key Establishment for Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.
[11] Javier Bajo,et al. Using Heterogeneous Wireless Sensor Networks in a Telemonitoring System for Healthcare , 2010, IEEE Transactions on Information Technology in Biomedicine.
[12] Thomas Staub,et al. MARWIS: A Management Architecture for Heterogeneous Wireless Sensor Networks , 2008, WWIC.
[13] John A. Stankovic,et al. Probability grid: a location estimation scheme for wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[14] Vijay Varadharajan,et al. A New Security Scheme for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[15] Meikang Qiu,et al. Energy Minimization for Heterogeneous Wireless Sensor Network , 2006 .
[16] Ivan Stojmenovic,et al. Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs , 2011, 2011 Proceedings IEEE INFOCOM.
[17] Jalel Ben-Othman,et al. REER: Robust and Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[18] Mohammed Feham,et al. An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks , 2012 .
[19] Young-Koo Lee,et al. Simple hash based message authentication scheme for wireless sensor networks , 2009, 2009 9th International Symposium on Communications and Information Technology.
[20] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[21] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[22] Lan Tien Nguyen,et al. An energy efficient routing scheme for mobile wireless sensor networks , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.
[23] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[24] Raheem A. Beyah,et al. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[25] Sriram Chellappan,et al. Providing End-to-End Secure Communications in Wireless Sensor Networks , 2011, IEEE Transactions on Network and Service Management.
[26] Shan Guo Quan,et al. Fast Data Aggregation Algorithm for Minimum Delay in Clustered Ubiquitous Sensor Networks , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[27] Kamlesh Gupta,et al. Security issues in wireless sensor networks , 2010 .
[28] Xiaohui Liang,et al. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[29] Francesco Grimaccia,et al. Architecture and Methods for Innovative Heterogeneous Wireless Sensor Network Applications , 2012, Remote. Sens..
[30] Chi-Chang Chen,et al. A NOVEL RANGE -FREE LOCALIZATION SCHEME FOR WIRELESS SENSOR NETWORKS , 2012, AdhocNets 2012.
[31] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[32] Meikang Qiu,et al. Energy minimization for heterogeneous wireless sensor networks , 2009, J. Embed. Comput..