A mutual authentication and key establishment scheme for heterogeneous sensor networks supporting nodes mobility
暂无分享,去创建一个
Luciano Lavagno | Claudio Pastrone | Maurizio A. Spirito | Sarmad Ullah Khan | L. Lavagno | M. Spirito | C. Pastrone
[1] I. Rubin,et al. Impact of the location area structure on the performance of signaling channels in wireless cellular networks , 1997 .
[2] Prem Dassanayake,et al. User Mobility Modeling and Characterization of Mobility Patterns , 1997, IEEE J. Sel. Areas Commun..
[3] Firdous Kausar,et al. An efficient key distribution scheme for heterogeneous sensor networks , 2007, IWCMC.
[4] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[5] Liwen Zhang,et al. A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography , 2010 .
[6] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[7] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[8] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[9] Huang Jie,et al. A key-chain based key management scheme for heterogeneous sensor network , 2010 .
[10] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[11] Mohamed Abid,et al. A lightweight user authentication scheme for Wireless Sensor Networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.
[12] Xiaojiang Du,et al. Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..
[13] Saber Banihashemian,et al. A new key management scheme in heterogeneous wireless sensor networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[14] Mingyan Liu,et al. Data-gathering wireless sensor networks: organization and capacity , 2003, Comput. Networks.
[15] Yau-Hwang Kuo,et al. Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[16] Mohsen Guizani,et al. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[17] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[18] Qing Yang,et al. An Efficient Key Management Scheme for Heterogeneous Sensor Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[19] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[20] Zygmunt J. Haas,et al. Predictive distance-based mobility management for PCS networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[21] Luciano Lavagno,et al. A key management scheme supporting node mobility in heterogeneous sensor networks , 2010, 2010 6th International Conference on Emerging Technologies (ICET).
[22] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[23] A. S. Poornima,et al. Tree-based key management scheme for heterogeneous sensor networks , 2008, 2008 16th IEEE International Conference on Networks.
[24] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[25] Suresh Singh,et al. Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[26] Deborah Estrin,et al. A system for simulation, emulation, and deployment of heterogeneous sensor networks , 2004, SenSys '04.
[27] Deng Pan,et al. Unpredictable Software-based Attestation Solution for node compromise detection in mobile WSN , 2010, 2010 IEEE Globecom Workshops.
[28] Liping Liu,et al. NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks , 2007 .
[29] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.
[30] Louise E. Moser,et al. An analysis of the optimum node density for ad hoc mobile networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[31] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[32] Fang Liu,et al. Location-aware key establishment in wireless sensor networks , 2006, IWCMC '06.
[33] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[34] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[35] Mingyan Liu,et al. Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[36] Wouter Joosen,et al. MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[37] R. S. Ramakrishna,et al. A Level-based Key Management for both In-Network Processing and Mobility in WSNs , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[38] Xiaoyan Hong,et al. An ad hoc network with mobile backbones , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).