Secure and practical access control mechanism for WSN with node privacy
暂无分享,去创建一个
[1] Sung-Woon Lee,et al. Enhanced novel access control protocol over wireless sensor networks , 2009, IEEE Transactions on Consumer Electronics.
[2] Sebastian Mödersheim,et al. OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.
[3] Yuguang Fang,et al. Access control in wireless sensor networks , 2007, Ad Hoc Networks.
[4] Elfed Lewis,et al. Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes , 2008 .
[5] Michael D. Smith,et al. Implementing public-key infrastructure for sensor networks , 2008, TOSN.
[6] Hui-Feng Huang,et al. A New Design of Access Control in Wireless Sensor Networks , 2011, Int. J. Distributed Sens. Networks.
[7] Naixue Xiong,et al. Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes , 2014, Sensors.
[8] Jian Shen,et al. Comment: "Eenhanced novel access control protocol over wireless sensor networks" , 2010, IEEE Trans. Consumer Electron..
[9] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[10] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] Dong Hoon Lee,et al. PACPs: practical access control protocols for wireless sensor networks , 2012, IEEE Transactions on Consumer Electronics.
[12] Li Xiao,et al. Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks , 2013, TOSN.
[13] Sandip Roy,et al. An efficient dynamic access control scheme for distributed wireless sensor networks , 2018, Int. J. Ad Hoc Ubiquitous Comput..
[14] Shekhar Verma,et al. Privacy in wireless sensor networks using ring signature , 2014, J. King Saud Univ. Comput. Inf. Sci..
[15] A. Gutub,et al. SERIAL VS. PARALLEL ELLIPTIC CURVE CRYPTO PROCESSOR DESIGNS , 2013 .
[16] Hui-Feng Huang,et al. A novel access control protocol for secure sensor networks , 2009, Comput. Stand. Interfaces.
[17] Alan Dahgwo Yein,et al. Secure Access Control Method for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[18] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[19] Da-Zhi Sun,et al. On the security of an enhanced novel access control protocol for wireless sensor networks , 2010, IEEE Transactions on Consumer Electronics.
[20] Prakash Ranganathan,et al. TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY , 2010 .
[21] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[22] Kyong-jin Kim,et al. Privacy Care Architecture in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[23] Adnan Abdul-Aziz Gutub,et al. Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations , 2007 .
[24] Andrei Gurtov,et al. Access Control Protocol With Node Privacy in Wireless Sensor Networks , 2016, IEEE Sensors Journal.
[25] Gennaro Boggia,et al. DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks , 2012, J. Syst. Softw..
[26] Kefei Chen,et al. Efficient User Access Control Mechanism for Wireless Multimedia Sensor Networks , 2011 .
[27] Daruri Venugopal,et al. Network Security and Cryptography , 2015 .
[28] Spyros Tragoudas,et al. A security protocol for sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[29] S. Arabia,et al. Implementation of a pipelined modular multiplier architecture for GF(p) elliptic curve cryptography computation , 2011 .
[30] Adnan Abdul-Aziz Gutub,et al. Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers , 2006, Int. Arab J. Inf. Technol..
[31] A. Gutub. Merging GF(p) Elliptic Curve Point Adding and Doubling on Pipelined VLSI Cryptographic ASIC Architecture , 2006 .
[32] Liang Liu,et al. Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks , 2019, Int. J. Distributed Sens. Networks.
[33] Seokjoo Shin,et al. Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing , 2019, Sensors.
[34] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[35] Seokjoo Shin,et al. Secure Routing Protocols for Source Node Privacy Protection in Multi-Hop Communication Wireless Networks , 2020 .
[36] Adnan Abdul-Aziz Gutub,et al. Area Flexible GF(2k) Elliptic Curve Cryptography Coprocessor , 2007, Int. Arab J. Inf. Technol..
[37] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[38] Ashok Kumar Das,et al. A Novel Efficient Access Control Scheme for Large-Scale Distributed Wireless Sensor Networks , 2013, Int. J. Found. Comput. Sci..