Key splitting: making random key distribution schemes resistant against node capture
暂无分享,去创建一个
Panagiotis Papadimitratos | Mohammad Reza Aref | Mahmoud Ahmadian-Attari | Mohammad Ehdaie | Nikolaos Alexiou | Panos Papadimitratos | M. Aref | M. Ahmadian-Attari | M. Ehdaie | N. Alexiou
[1] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[2] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[6] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[7] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[8] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[9] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[10] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[11] Shiuh-Pyng Shieh,et al. Adaptive Random Key Distribution Schemes for Wireless Sensor Networks , 2005 .
[12] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[13] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[14] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[15] Tyler Moore. A collusion attack on pairwise key predistribution schemes for distributed sensor networks , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[16] Panagiotis Papadimitratos,et al. Towards provable secure neighbor discovery in wireless networks , 2008, FMSE '08.
[17] Panagiotis Papadimitratos,et al. Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.
[18] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[19] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[20] Yong Jae Lee,et al. Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools , 2010, J. Intell. Manuf..
[21] Panagiotis Papadimitratos,et al. A randomized countermeasure against parasitic adversaries in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.
[22] Panagiotis Papadimitratos,et al. Resilient data aggregation for unattended WSNs , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[23] Jiankun Hu,et al. Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[24] Vashek Matyas,et al. Two Improvements of Random Key Predistribution for Wireless Sensor Networks , 2012, SecureComm.
[25] Panagiotis Papadimitratos,et al. Stealthy pre-attacks against random key pre-distribution security , 2012, 2012 IEEE International Conference on Communications (ICC).
[26] Panagiotis Papadimitratos,et al. Key splitting for random key distribution schemes , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).