Authentication Protocol for Wireless Sensor Networks
暂无分享,去创建一个
[1] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[2] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[3] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] Ronald L. Rivest,et al. Responses to NIST's proposal , 1992, CACM.
[5] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[6] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[7] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[8] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[9] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[10] Hee Yong Youn,et al. An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks , 2005, EUC Workshops.
[11] A. Zomaya,et al. A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..
[12] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[13] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[14] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[15] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[16] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[17] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[18] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[19] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.