Dynamic key management in wireless sensor networks: A survey
暂无分享,去创建一个
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] Hattab Guesmi,et al. Smart wireless sensor networks for online faults diagnosis in induction machine , 2015, Comput. Electr. Eng..
[3] Gianluca Dini,et al. An efficient key revocation protocol for wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[4] Gicheol Wang,et al. Lightweight Key Renewals for Clustered Sensor Networks , 2010, J. Networks.
[5] Haiyun Luo,et al. A two-tier data dissemination model for large-scale wireless sensor networks , 2002, MobiCom '02.
[6] Yau-Hwang Kuo,et al. Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[7] Tanbhir Hoq,et al. Micro hydro power: promising solution for off-grid renewable energy source , 2011 .
[8] I-En Liao,et al. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[9] Sanjay Kumar Madria,et al. A survey of dynamic key management schemes in sensor networks , 2010 .
[10] Kong Fan. Collusion Problem of the EBS-Based Dynamic Key Management Scheme , 2009 .
[11] Hoang Duc Chinh,et al. Smart Wireless Sensor Networks , 2010 .
[12] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[13] Vijay Varadharajan,et al. Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..
[14] Peter I. Corke,et al. Toward trusted wireless sensor networks , 2010, TOSN.
[15] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[16] M. Dehghan,et al. Key Management Mechanisms in Wireless Sensor Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).
[17] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[18] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[19] Myong-Soon Park,et al. An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[20] Dong Hoon Lee,et al. Classification of Key Management Schemes for Wireless Sensor Networks , 2007, APWeb/WAIM Workshops.
[21] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[22] R. Divya,et al. A novel dynamic key management scheme based on hamming distance for wireless sensor networks , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).
[23] Xingming Sun,et al. An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge , 2009, Comput. Commun..
[24] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[25] Adi Shamir,et al. How to share a secret , 1979, CACM.
[26] Yuan Zhang,et al. A Cluster-Based Group Key Management Scheme for Wireless Sensor Networks , 2010, 2010 12th International Asia-Pacific Web Conference.
[27] Sencun Zhu,et al. A random perturbation-based scheme for pairwise key establishment in sensor networks , 2007, MobiHoc '07.
[28] Sencun Zhu,et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.
[29] Chin-Ling Chen,et al. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks , 2010, Sensors.
[30] Ming-Hua Chang,et al. List Decoding of Generalized Reed-Solomon Codes by Using a Modified Extended Key Equation Algorithm , 2011, EURASIP J. Wirel. Commun. Netw..
[31] Yong Wang,et al. A Key Management Protocol for Wireless Sensor Networks with Multiple Base Stations , 2008, 2008 IEEE International Conference on Communications.
[32] Sencun Zhu,et al. Predistribution and local collaboration-based group rekeying for wireless sensor networks , 2009, Ad Hoc Networks.
[33] Chi-Chun Lo,et al. An efficient and scalable EBS-based batch rekeying scheme for secure group communications , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[34] Jongwan Kim,et al. Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed Sensor Networks , 2008, J. Inf. Sci. Eng..
[35] Giuseppe Anastasi,et al. An Analytical Study of Reliable and Energy-Efficient Data Collection in Sparse Sensor Networks with Mobile Relays , 2009, EWSN.
[36] Heejo Lee,et al. MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks , 2010, Ann. des Télécommunications.
[37] Tzung-Pei Hong,et al. A GA-BASED KEY-MANAGEMENT SCHEME IN HIERARCHICAL WIRELESS SENSOR NETWORKS , 2009 .
[38] WenCheng Yang,et al. An authentication protocol for hierarchy-based wireless sensor networks , 2008, 2008 23rd International Symposium on Computer and Information Sciences.
[39] N. Dhinakaran,et al. A survey of key predistribution schemes for key management in wireless sensor networks , 2010, ICN 2010.
[40] Sun,et al. Review of Key Management Mechanisms in Wireless Sensor Networks , 2006 .
[41] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[42] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[43] Subhankar Chattopadhyay,et al. A Survey on Key Pre-distribution Scheme in Homogeneous Wireless Sensor Networks , 2010 .
[44] Ronald L. Rivest,et al. Responses to NIST's proposal , 1992, CACM.
[45] Sungyoung Lee,et al. A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks , 2010, J. Comput. Sci. Eng..
[46] Xing Zhang,et al. EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[47] Jin Myoung Kim,et al. A*-based key tree structure generation for group key management in wireless sensor networks , 2008, Comput. Commun..
[48] Shivakant Mishra,et al. A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[49] Peter Desnoyers,et al. TSAR: a two tier sensor storage architecture using interval skip graphs , 2005, SenSys '05.
[50] Mohamed Eltoweissy,et al. Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.
[51] Chun-Wen Li,et al. Collusion Problem of the EBS-Based Dynamic Key Management Scheme: Collusion Problem of the EBS-Based Dynamic Key Management Scheme , 2009 .
[52] Yong Wang,et al. An efficient scheme for removing compromised sensor nodes from wireless sensor networks , 2010, Secur. Commun. Networks.
[53] Sajal K. Das,et al. Group key distribution via local collaboration in wireless sensor networks , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[54] Song Guo. A Compromise-Resilient Pair-wise Rekeying Protocol in Large-Scale Wireless Sensor Networks , 2010 .
[55] Mohamed Eltoweissy,et al. Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.
[56] Mohamed F. Younis,et al. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.
[57] Paulo S. L. M. Barreto,et al. A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.
[58] Makhlouf Aliouat,et al. Tree Based Protocol for Key Management in Wireless Sensor Networks , 2010, EURASIP J. Wirel. Commun. Netw..
[59] Mohamed Eltoweissy,et al. TKGS: verifiable threshold-based key generation scheme in open wireless ad hoc networks , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).
[60] Muhammad Khurram Khan,et al. A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography , 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification.
[61] Tzung-Shi Chen,et al. Data Aggregation for Range Query in Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[62] Dirk Timmermann,et al. Low energy adaptive clustering hierarchy with deterministic cluster-head selection , 2002, 4th International Workshop on Mobile and Wireless Communications Network.