-
1
-
-
30344482882
-
INSENS: Intrusion-tolerant routing for wireless sensor networks
-
DOI 10.1016/j.comcom.2005.05.018, PII S0140366405002045
-
Deng J., Han R., Mishra S. INSENS: Intrusion-tolerant routing for wireless sensor networks[J]. Computer Communications, 2006, 29, 216-230. (Pubitemid 43060026)
-
(2006)
Computer Communications
, vol.29
, Issue.2
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
2
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Xiao Y., et al.A survey of key management schemes in wireless sensor networks[J]. Computer Communications, 2007, 30,2314-2341 (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
4
-
-
40849124634
-
Performance optimization of region-based group key management in mobile ad hoc networks[J]
-
Choa J H, Chena I R, Wang D C. Performance optimization of region-based group key management in mobile ad hoc networks[J]. Performance Evaluation, 2008,65: 319-344.
-
(2008)
Performance Evaluation
, vol.65
, pp. 319-344
-
-
Choa, J.H.1
Chena, I.R.2
Wang, D.C.3
-
5
-
-
34347240364
-
Key management schemes and protocols for wireless sensor networks[J]
-
DOI 10.1360/jos181218
-
Su Z., Lin C., Feng F J, et al. Key management schemes and protocols for wireless sensor networks[J]. Journal of Software, 2007,18(5): 1218-1231 (in Chinese). (Pubitemid 47005814)
-
(2007)
Journal of Software
, vol.18
, Issue.5
, pp. 1218-1231
-
-
Su, Z.1
Lin, C.2
Feng, F.-J.3
Ren, F.-Y.4
-
8
-
-
70350676481
-
A Comparative analysis of PKC and Semi-PKC based key management schemes for hierarchical sensor networks[J]
-
Naureen A., Akram A., Riaz R., et al. A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks[J]. Lecture Notes in Computer Science, 2009, 5576:629-701.
-
(2009)
Lecture Notes in Computer Science
, vol.5576
, pp. 629-701
-
-
Naureen, A.1
Akram, A.2
Riaz, R.3
-
9
-
-
56949106654
-
A unified security framework with three key management schemes for wireless sensor networks[J]
-
Riaz R., Naureen A., Akram A., et al. A unified security framework with three key management schemes for wireless sensor networks[J]. Computer Communications, 2008, 31:4269-4280.
-
(2008)
Computer Communications
, vol.31
, pp. 4269-4280
-
-
Riaz, R.1
Naureen, A.2
Akram, A.3
-
10
-
-
75749084065
-
MUQAMI+: A scalable and locally distributed key management scheme for clustered sensor networks[J]
-
Syed M., Lee H., Lee S., et al. MUQAMI+: A scalable and locally distributed key management scheme for clustered sensor networks[J]. Annales des Télécommunications, 2010,65(1-2): 101-116.
-
(2010)
Annales des Télécommunications
, vol.65
, Issue.1-2
, pp. 101-116
-
-
Syed, M.1
Lee, H.2
Lee, S.3
-
11
-
-
78651582607
-
Location-aware and secretshare based dynamic key management scheme for heterogeneous sensor networks[J]
-
Ma C G, Geng G N, Wang H Q. A Location-aware and Secretshare Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks[J]. Journal Of Networks, 2010,5(4):500-507.
-
(2010)
Journal of Networks
, vol.5
, Issue.4
, pp. 500-507
-
-
Ma, C.G.1
Geng, G.N.2
Wang, H.Q.A.3
-
12
-
-
70349406061
-
Collusion problem of the EBS-based dynamic key management scheme[J]
-
Kong F R, Li C W, Ding Q Q, et al. Collusion problem of the EBS-based dynamic key management scheme[J]. Journal of Software, 2009,20(9): 2531-2541.
-
(2009)
Journal of Software
, vol.20
, Issue.9
, pp. 2531-2541
-
-
Kong, F.R.1
Li, C.W.2
Ding, Q.Q.3
-
14
-
-
10944266504
-
HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
-
DOI 10.1109/TMC.2004.41
-
Younis O., Fahmy S. HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks[J] IEEE Transactions on Mobile Computing, 2004, 3(4): 366-379. (Pubitemid 40010934)
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
15
-
-
0141509888
-
Distributed localization in wireless sensor networks: A quantitative comparison[J]
-
Langendoen K., Reijers N. Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison[J]. Computer Networks, 2003,43(4): 499-518.
-
(2003)
Computer Networks
, vol.43
, Issue.4
, pp. 499-518
-
-
Langendoen, K.1
Reijers, N.2
-
18
-
-
3543105535
-
Combinatorial optimization for group key management[J]
-
Eltoweissy M., Heydari H., Morales L., et al. Combinatorial Optimization for Group Key Management[J]. Journal of Network and System Management, 2004, 12(1).
-
(2004)
Journal of Network and System Management
, vol.12
, Issue.1
-
-
Eltoweissy, M.1
Heydari, H.2
Morales, L.3
-
19
-
-
1542265638
-
-
US Secure Hash Algorithm 1 (SHA-I)[S], IETF
-
Eastlake D., Jones P. RFC 3174.US Secure Hash Algorithm 1 (SHA-I)[S], IETF, 2001.
-
(2001)
RFC 3174
-
-
Eastlake, D.1
Jones, P.2
-
20
-
-
80052017105
-
-
The MD5 Message-Digest Algorithm[S]. MIT and RSA Data Security, Inc.
-
Rivest R. RFC 1320, The MD5 Message-Digest Algorithm[S]. MIT and RSA Data Security, Inc., 1992.
-
(1992)
RFC 1320
-
-
Rivest, R.1
-
22
-
-
33646921841
-
Location-aware combinatorial key management scheme for clustered sensor networks
-
DOI 10.1109/TPDS.2006.106
-
Younis M F, Ghumman K., Eltoweissy M. Location-aware combinatorial key management scheme for clustered sensor networks[J]. IEEE Transactions on Parallel and Distributed System, 2006, 17(8): 865-882. (Pubitemid 44070154)
-
(2006)
IEEE Transactions on Parallel and Distributed Systems
, vol.17
, Issue.8
, pp. 865-882
-
-
Younis, M.F.1
Ghumman, K.2
Eltoweissy, M.3
|