Secure Communication for Cluster Based Wireless Sensor Network
暂无分享,去创建一个
[1] Mikael J. Simovits. The DES : An Extensive Documentation and Evaluation of the Data Encryption Standard , 1996 .
[2] Chin-Fu Kuo,et al. A half-key key management scheme for wireless sensor networks , 2011, RACS.
[3] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[4] Brijesh Kumar Chaurasia,et al. Secure Congestion Adaptive Routing Using Group Signature Scheme , 2013, Trans. Comput. Sci..
[5] Shekhar Verma,et al. Viability of multivariate cryptosystems for WSN , 2010, 2010 International Conference for Internet Technology and Secured Transactions.
[6] Avijit Kar,et al. Key management in secure self organized wireless sensor network: a new approach , 2011, ICWET.
[7] Sungyoung Lee,et al. Public key cryptography-based security scheme for wireless sensor networks in healthcare , 2010, ICUIMC '10.
[8] Rakesh Maharana,et al. An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC , 2013 .
[9] Fuxiang Gao,et al. Dynamic window based multihop authentication for WSN , 2010, CCS '10.
[10] Shekhar Verma,et al. Dynamic Multi-level Hierarchal Clustering Approach for Wireless Sensor Networks , 2009, 2009 11th International Conference on Computer Modelling and Simulation.
[11] Hao Chen,et al. Efficient compromising resilient authentication schemes for large scale wireless sensor networks , 2010, WiSec '10.
[12] J. Lokesh,et al. Design of robust and secure encryption scheme for WSN using PKI (LWT-PKI) , 2009, 2009 First International Communication Systems and Networks and Workshops.
[13] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[14] Mohsen Guizani,et al. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[15] Gaurav Sharma,et al. A survey and taxonomy of symmetric key management schemes for wireless sensor networks , 2012, CUBE.
[16] Ayan Kumar Das,et al. Intelligent Energy Efficient Routing for Ad-Hoc Sensor Network by Designing QCS Protocol , 2011 .
[17] Satyajit Banerjee,et al. Symmetric key based authenticated querying in wireless sensor networks , 2006, InterSense '06.
[18] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[19] Zhang Yu. The scheme of public key infrastructure for improving wireless sensor networks security , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering.
[20] Mohamed F. Younis,et al. A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.
[21] Shekhar Verma,et al. Two-phase clustering based aggregation of sensor data , 2010, Int. J. Data Min. Model. Manag..