Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks
暂无分享,去创建一个
[1] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[2] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[3] Yong Wang,et al. A Key Management Protocol for Wireless Sensor Networks with Multiple Base Stations , 2008, 2008 IEEE International Conference on Communications.
[4] Sushil Jajodia,et al. Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation , 2009, IEEE Transactions on Vehicular Technology.
[5] Milind Dawande,et al. Energy efficient schemes for wireless sensor networks with multiple mobile base stations , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[6] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[7] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[8] Layuan Li,et al. Multihop Routing Protocol with Unequal Clustering for Wireless Sensor Networks , 2008, 2008 ISECS International Colloquium on Computing, Communication, Control, and Management.
[9] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[10] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[11] Yue Wu,et al. A Survey on Key Management for Multicast , 2010, 2010 Second International Conference on Information Technology and Computer Science.
[12] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[13] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[14] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[15] Yue Wu,et al. A hierarchical key management scheme for large and dynamic multicast groups , 2009, 2009 International Conference on Apperceiving Computing and Intelligence Analysis.
[16] Seungjin Park,et al. Hop-Count based location discovery in ad hoc sensor networks , 2004 .
[17] P. Ning,et al. Multi-Level μ TESLA : A Broadcast Authentication System for Distributed Sensor Networks ∗ , 2003 .
[18] Jaydip Sen. A Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.
[19] Shivakant Mishra,et al. Enhancing Base Station Security in Wireless Sensor Networks , 2003 .
[20] Ben-Jye Chang,et al. Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[21] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[22] Markus Jakobsson,et al. Almost Optimal Hash Sequence Traversal , 2002, Financial Cryptography.
[23] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[24] B. Parvathavarthini,et al. An efficient cluster based key management scheme for MANET with authentication , 2010, Trendz in Information Sciences & Computing(TISC2010).
[25] Henrik Tange,et al. Attacks and countermeasures on AES and ECC , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[26] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.