A novel and low-energy PKC-based key agreement protocol for WSNs
暂无分享,去创建一个
[1] Hans Eberle,et al. Energy Analysis of Public-Key Cryptography on Small Wireless Devices , 2004 .
[2] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[3] Vijay Varadharajan,et al. Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..
[4] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[5] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[6] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[7] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[8] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[9] Wenjing Lou,et al. Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[10] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[11] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[12] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[13] H BloomBurton. Space/time trade-offs in hash coding with allowable errors , 1970 .
[14] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[15] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[16] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[17] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[18] Michael Mitzenmacher,et al. Compressed bloom filters , 2001, PODC '01.