-
1
-
-
0037086890
-
Wireless sensor networks: a survey
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
New York, NY, USA, Springer-Verlag
-
R. Blom, An optimal class of symmetric key generation systems," Proceedings of the Eurocrypt '84 Workshop on Advances in cryptology: Theory and Application of Cryptographic Techniques, pp. 335-338, New York, NY, USA, Springer-Verlag, 1985.
-
(1985)
Proceedings of the Eurocrypt '84 Workshop on Advances in cryptology: Theory and Application of Cryptographic Techniques
, pp. 335-338
-
-
Blom, R.1
-
3
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," Crypto '92, pp. 471-486, 1992.
-
(1992)
Crypto '92
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
4
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. X. Song, "Random key predistribution schemes for sensor networks," IEEE Symposium on Security and Privacy, pp. 197, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, vol.197
-
-
Chan, H.1
Perrig, A.2
Song, D.X.3
-
5
-
-
4344668573
-
Overview of sensor networks
-
D. Culler, D. Estrin, and M. B. Srivastava, "Overview of sensor networks," IEEE Computer Society, pp. 41-49, 2004.
-
(2004)
IEEE Computer Society
, pp. 41-49
-
-
Culler, D.1
Estrin, D.2
Srivastava, M.B.3
-
6
-
-
33745969132
-
Defending against path-based dos attacks in wireless sensor networks
-
J. Deng, R. Han, and S. Mishra, "Defending against path-based dos attacks in wireless sensor networks, SASN, pp. 89-96, 2005.
-
(2005)
SASN
, pp. 89-96
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
7
-
-
0017018484
-
New directions in cryptography
-
W. Di±e and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, pp. 644-654
-
-
Die, W.1
Hellman, M.E.2
-
8
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," INFOCOM, pp. 1-12, 2004.
-
(2004)
INFOCOM
, pp. 1-12
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
9
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 228-258, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
10
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM CCS
-
L. Eschenauer, and V. D. Gligor, "A key-management scheme for distributed sensor networks," ACM CCS, pp. 41-47, 2002.
-
(2002)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
11
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and rsa on 8-bit cpus," CHES, pp. 119-132, 2004.
-
(2004)
CHES
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
12
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
D. Huang, M. Mehta, D. Medhi, and L. Harn, "Location-aware key management scheme for wireless sensor networks," SASN, pp. 29-42, 2004.
-
(2004)
SASN
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Harn, L.4
-
13
-
-
14844335004
-
Revisiting random key pre-distribution schemes for wireless sensor networks
-
J. Hwang, and Y. Kim, "Revisiting random key pre-distribution schemes for wireless sensor networks, SASN, pp. 43-52, 2004.
-
(2004)
SASN
, pp. 43-52
-
-
Hwang, J.1
Kim, Y.2
-
14
-
-
33745933645
-
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
-
T. Ito, H. Ohta, N. Matsuda, and T. Yoneda, "A key pre-distribution scheme for secure sensor networks using probability density function of node deployment," SASN, pp. 69-75, 2005.
-
(2005)
SASN
, pp. 69-75
-
-
Ito, T.1
Ohta, H.2
Matsuda, N.3
Yoneda, T.4
-
16
-
-
84875360209
-
-
Third Edition, Addison-Wesley ISBN: 0-201-
-
D. Knuth, The Art of Computer Programming: Seminumerical Algorithms, vol. 2, Third Edition, Addison-Wesley, ISBN: 0-201-89684-2, 1997.
-
(1997)
The Art of Computer Programming: Seminumerical Algorithms
, vol.2
, pp. 89684-89692
-
-
Knuth, D.1
-
17
-
-
0034548432
-
A scalable location service for geographic ad hoc routing
-
J. Li, J. Jannotti, D. S. J. D. Couto, D. R. Karger, and R. Morris, "A scalable location service for geographic ad hoc routing," MOBICOM, pp. 120-130, 2000.
-
(2000)
MOBICOM
, pp. 120-130
-
-
Li, J.1
Jannotti, J.2
Couto, D.S.J.D.3
Karger, D.R.4
Morris, R.5
-
18
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, and P. Ning, "Establishing pairwise keys in distributed sensor networks," ACM CCS, pp. 52-61, 2003.
-
(2003)
ACM CCS
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
19
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41-77, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
20
-
-
20344381294
-
A publickey infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography," First IEEE International Conference on Sensor and Ad Hoc Communication and Networks, pp. 71-80, 2004.
-
(2004)
First IEEE Interna-tional Conference on Sensor and Ad Hoc Communication and Networks
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
21
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
J. M. McCune, E. Shi, A. Perrig, and M. K. Reiter, "Detection of denial-of-message attacks on sensor network broadcasts," IEEE Symposium on Security and Privacy, pp. 64-78, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 64-78
-
-
McCune, J.M.1
Shi, E.2
Perrig, A.3
Reiter, M.K.4
-
22
-
-
54249109581
-
On the grid based key pre-distribution: Toward a better connectivity in wireless sensor networks
-
to appear
-
A. Mohaisen, Y. Maeng, and D. Nyang, "On the grid based key pre-distribution: Toward a better connectivity in wireless sensor networks," SSDU 2007, to appear, 2007.
-
(2007)
SSDU
, vol.2007
-
-
Mohaisen, A.1
Maeng, Y.2
Nyang, D.3
-
23
-
-
33745569997
-
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
-
A. Mohaisen, and D. Nyang, "Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks," EWSN, pp. 83-98, 2006.
-
(2006)
EWSN
, pp. 83-98
-
-
Mohaisen, A.1
Nyang, D.2
-
24
-
-
3042785862
-
The sybil attack in sensor networks: analysis & defenses
-
J. Newsome, E. Shi, D. X. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," IPSN, pp. 259-268, 2004.
-
(2004)
IPSN
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.X.3
Perrig, A.4
-
25
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perrig, and V. D. Gligor, "Distributed detection of node replication attacks in sensor networks," IEEE Symposium on Security and Privacy, pp. 49-63, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.D.3
-
26
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: Security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
27
-
-
4544301464
-
Random key-assignment for secure wireless sensor networks
-
R. D. Pietro, L. V. Mancini, and A. Mei, "Random key-assignment for secure wireless sensor networks," SASN, pp. 62-71, 2003.
-
(2003)
SASN
, pp. 62-71
-
-
Pietro, R.D.1
Mancini, L.V.2
Mei, A.3
-
28
-
-
33745656073
-
E±cient and resilient key discovery based on pseudo-random key pre-deployment
-
R. D. Pietro, L. V. Mancini, and A. Mei, "Efficient and resilient key discovery based on pseudo-random key pre-deployment," IPDPS, pp. 217-227, 2004.
-
(2004)
"IPDPS
, pp. 217-227
-
-
Pietro, R.D.1
Mancini, L.V.2
Mei, A.3
-
29
-
-
84976664565
-
A method for obtaining digital signatures and public-key crypto-systems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key crypto-systems," CACM, vol. 26, no. 1, pp. 96-99, 1983.
-
(1983)
CACM
, vol.26
, Issue.1
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
30
-
-
23944447698
-
A security architecture for mobile wireless sensor networks
-
S. Schmidt, H. Krahn, S. Fischer, and D. Watjen, "A security architecture for mobile wireless sensor networks," ESAS, pp. 166-177, 2004.
-
(2004)
ESAS
, pp. 166-177
-
-
Schmidt, S.1
Krahn, H.2
Fischer, S.3
Watjen, D.4
-
31
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communication of ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communication of ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
33
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," PerCom, pp. 324-328, 2005.
-
(2005)
PerCom
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
34
-
-
14844304757
-
Tinypk: securing sensor networks with public key technology
-
R. J. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, "Tinypk: securing sensor networks with public key technology," SASN, pp. 59-64, 2004.
-
(2004)
SASN
, pp. 59-64
-
-
Watro, R.J.1
Kong, D.2
Fen Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
35
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
|