An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks
暂无分享,去创建一个
[1] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[2] Mingyan Liu,et al. Data-gathering wireless sensor networks: organization and capacity , 2003, Comput. Networks.
[3] S. Gandhi,et al. An Efficient Key Management Scheme for Heterogeneous Sensor Networks , 2011 .
[4] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[5] Suresh Singh,et al. Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[6] G.-A. Kamendje,et al. A tamper resistant CMOS crypto-key generation unit , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[7] Fang Liu,et al. Location-aware key establishment in wireless sensor networks , 2006, IWCMC '06.
[8] Deborah Estrin,et al. A system for simulation, emulation, and deployment of heterogeneous sensor networks , 2004, SenSys '04.
[9] Firdous Kausar,et al. An efficient key distribution scheme for heterogeneous sensor networks , 2007, IWCMC.
[10] Wouter Joosen,et al. MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[11] R. S. Ramakrishna,et al. A Level-based Key Management for both In-Network Processing and Mobility in WSNs , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[12] Luciano Lavagno,et al. An effective key management scheme for mobile heterogeneous sensor networks , 2011, International Conference on Information Society (i-Society 2011).
[13] Liwen Zhang,et al. A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography , 2010 .
[14] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[15] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[16] Dharma P. Agrawal,et al. Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[17] Mingyan Liu,et al. Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[18] Mohamed Abid,et al. A lightweight user authentication scheme for Wireless Sensor Networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.
[19] Luciano Lavagno,et al. A key management scheme supporting node mobility in heterogeneous sensor networks , 2010, 2010 6th International Conference on Emerging Technologies (ICET).
[20] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[21] A. S. Poornima,et al. Tree-based key management scheme for heterogeneous sensor networks , 2008, 2008 16th IEEE International Conference on Networks.
[22] Juwei Zhang,et al. A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography , 2010, 2010 International Conference on Internet Technology and Applications.
[23] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[24] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[25] Yau-Hwang Kuo,et al. Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[26] Liping Liu,et al. NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks , 2007 .
[27] Xiaoyan Hong,et al. An ad hoc network with mobile backbones , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[28] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[29] Mohsen Guizani,et al. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[30] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[31] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.
[32] Deng Pan,et al. Unpredictable Software-based Attestation Solution for node compromise detection in mobile WSN , 2010, 2010 IEEE Globecom Workshops.
[33] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[34] Heribert Baldus,et al. A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).