-
1
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. SP, May 2003, pp. 197-213.
-
(2003)
Proc. IEEE Symp. SP
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
2
-
-
32844459414
-
A key predistribution scheme for sensor networks using deployment knowledge
-
Jan./Mar
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Trans. Dependable Secure Comput., vol. 3, no. 1, pp. 62-77, Jan./Mar. 2006.
-
(2006)
IEEE Trans. Dependable Secure Comput.
, vol.3
, Issue.1
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
3
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, P. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228-258, 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
Katz, J.5
Khalili, A.6
-
4
-
-
77957230388
-
Private key agreement and secure communication for heterogeneous sensor networks
-
M. Rahman and K. El-Khatib, "Private key agreement and secure communication for heterogeneous sensor networks," J. Parallel Distrib. Comput., vol. 70, no. 8, pp. 858-870, 2010.
-
(2010)
J. Parallel Distrib. Comput.
, vol.70
, Issue.8
, pp. 858-870
-
-
Rahman, M.1
El-Khatib, K.2
-
5
-
-
84878360546
-
Dynamic and secure key management model for hierarchical heterogeneous sensor networks
-
Dec
-
M. R. Alagheband and M. R. Aref, "Dynamic and secure key management model for hierarchical heterogeneous sensor networks," IET Inf. Secur., vol. 6, no. 4, pp. 271-280, Dec. 2012.
-
(2012)
IET Inf. Secur.
, vol.6
, Issue.4
, pp. 271-280
-
-
Alagheband, M.R.1
Aref, M.R.2
-
6
-
-
33748994965
-
A deterministic pairwise key predistribution scheme for mobile sensor networks
-
Sep.
-
D. S. Sanchez and H. Baldus, "A deterministic pairwise key predistribution scheme for mobile sensor networks," in Proc. 1st Int. Conf. SecureComm, Sep. 2005, pp. 277-288.
-
(2005)
Proc. 1st Int. Conf. SecureComm
, pp. 277-288
-
-
Sanchez, D.S.1
Baldus, H.2
-
7
-
-
36348971223
-
Twolayered dynamic key management in mobile and long-lived clusterbased wireless sensor networks
-
Mar.
-
I.-H. Chuang, W.-T. Su, C.-Y. Wu, J.-P. Hsu, and Y.-H. Kuo, "Twolayered dynamic key management in mobile and long-lived clusterbased wireless sensor networks," in Proc. IEEE WCNC, Mar. 2007, pp. 4145-4150.
-
(2007)
Proc. IEEE WCNC
, pp. 4145-4150
-
-
Chuang, I.-H.1
Su, W.-T.2
Wu, C.-Y.3
Hsu, J.-P.4
Kuo, Y.-H.5
-
8
-
-
84871531046
-
A novel key update protocol in mobile sensor networks
-
S. Agrawal, R. Roman, M. L. Das, A. Mathuria, and J. Lopez, "A novel key update protocol in mobile sensor networks," in Proc. 8th Int. Conf. ICISS, vol. 7671. 2012, pp. 194-207.
-
(2012)
Proc. 8th Int. Conf. ICISS
, vol.7671
, pp. 194-207
-
-
Agrawal, S.1
Roman, R.2
Das, M.L.3
Mathuria, A.4
Lopez, J.5
-
9
-
-
81155123877
-
An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks
-
Sep.
-
S. U. Khan, C. Pastrone, L. Lavagno, and M. A. Spirito, "An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks," in Proc. 6th Int. Conf. CRiSIS, Sep. 2011, pp. 1-8.
-
(2011)
Proc. 6th Int. Conf. CRiSIS
, pp. 1-8
-
-
Khan, S.U.1
Pastrone, C.2
Lavagno, L.3
Spirito, M.A.4
-
10
-
-
79952143873
-
EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks
-
Jan
-
X. Zhang, J. He, and Q. Wei, "EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks," EURASIP J. Wireless Commun. Netw., vol. 2011, pp. 1-11, Jan. 2011.
-
(2011)
EURASIP J. Wireless Commun. Netw.
, vol.2011
, pp. 1-11
-
-
Zhang, X.1
He, J.2
Wei, Q.3
-
11
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," in Proc. 6th Int. Workshop Cryptograph. Hardw. Embedded Syst., 2004, pp. 119-132.
-
(2004)
Proc. 6th Int. Workshop Cryptograph. Hardw. Embedded Syst.
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
13
-
-
84921421590
-
Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing
-
West Lafayette, IN, USA, Tech. Rep. CERIAS TR 2013-10. [Online]. Available:
-
S. Seo and E. Bertino, "Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing," CERIAS, West Lafayette, IN, USA, Tech. Rep. CERIAS TR 2013-10, 2013. [Online]. Available: https://www.cerias.purdue.edu/apps/reports-and-papers/.Seung-Hyun
-
(2013)
CERIAS
-
-
Seo, S.1
Bertino, E.2
-
14
-
-
84898930952
-
POSTER: A pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures
-
S. H. Seo, J. Won, and E. Bertino, "POSTER: A pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures," in Proc. 4th ACM CODASPY, 2014, pp. 143-146.
-
(2014)
Proc. 4th ACM CODASPY
, pp. 143-146
-
-
Seo, S.H.1
Won, J.2
Bertino, E.3
-
15
-
-
1542286901
-
Fast authenticated key establishment protocols for self-organizing sensor networks
-
Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, "Fast authenticated key establishment protocols for self-organizing sensor networks," in Proc. 2nd ACM Int. Conf. WSNA, 2003, pp. 141-150.
-
(2003)
Proc. 2nd ACM Int. Conf. WSNA
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
-
16
-
-
84921327073
-
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
-
X.-J. Lin and L. Sun, "Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks," in Proc. IACR Cryptol. ePrint Archive, 2013, pp. 698-698.
-
(2013)
Proc. IACR Cryptol. EPrint Archive
, pp. 698-698
-
-
Lin, X.-J.1
Sun, L.2
-
17
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks," in Proc. 5th Eur. Conf. WSN, vol. 4913. 2008, pp. 305-320.
-
(2008)
Proc. 5th Eur. Conf. WSN
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
18
-
-
84875103762
-
An improved ID-based key management scheme in wireless sensor network
-
K. Chatterjee, A. De, and D. Gupta, "An improved ID-based key management scheme in wireless sensor network," in Proc. 3rd Int. Conf. ICSI, vol. 7332. 2012, pp. 351-359.
-
(2012)
Proc. 3rd Int. Conf. ICSI
, vol.7332
, pp. 351-359
-
-
Chatterjee, K.1
De, A.2
Gupta, D.3
-
19
-
-
84859883917
-
Detecting node replication attacks in mobile sensor networks: Theory and approaches
-
W. T. Zhu, J. Zhou, R. H. Deng, and F. Bao, "Detecting node replication attacks in mobile sensor networks: Theory and approaches," Secur. Commun. Netw., vol. 5, no. 5, pp. 496-507, 2012.
-
(2012)
Secur. Commun. Netw.
, vol.5
, Issue.5
, pp. 496-507
-
-
Zhu, W.T.1
Zhou, J.2
Deng, R.H.3
Bao, F.4
-
20
-
-
84867604390
-
A survey of intrusion detection schemes in wireless sensor networks
-
M. A. Rassam, M. A. Maarof, and A. Zainal, "A survey of intrusion detection schemes in wireless sensor networks," Amer. J. Appl. Sci., vol. 9, no. 10, pp. 1636-1652, 2012.
-
(2012)
Amer. J. Appl. Sci.
, vol.9
, Issue.10
, pp. 1636-1652
-
-
Rassam, M.A.1
Maarof, M.A.2
Zainal, A.3
-
21
-
-
63849103054
-
A new method for node fault detection in wireless sensor networks
-
P. Jiang, "A new method for node fault detection in wireless sensor networks," Sensors, vol. 9, no. 2, pp. 1282-1294, 2009.
-
(2009)
Sensors
, vol.9
, Issue.2
, pp. 1282-1294
-
-
Jiang, P.1
-
22
-
-
34250722535
-
A survey of fault management in wireless sensor networks
-
L. Paradis and Q. Han, "A survey of fault management in wireless sensor networks," J. Netw. Syst. Manage., vol. 15, no. 2, pp. 171-190, 2007.
-
(2007)
J. Netw. Syst. Manage.
, vol.15
, Issue.2
, pp. 171-190
-
-
Paradis, L.1
Han, Q.2
-
23
-
-
84921400494
-
-
Online]. Available. html, accessed Dec. 2014
-
(2013). All About Battery. [Online]. Available: http://www.allaboutbatteries.com/Energy-tables. html, accessed Dec. 2014.
-
(2013)
All about Battery
-
-
-
24
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
Apr.
-
A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in Proc. Int. Conf. IPSN, Apr. 2008, pp. 245-256.
-
(2008)
Proc. Int. Conf. IPSN
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
25
-
-
84863015711
-
An efficient key management scheme for wireless sensor networks
-
Sep
-
D. Du, H. Xiong, and H. Wang, "An efficient key management scheme for wireless sensor networks," Int. J. Distrib. Sensor Netw., vol. 2012, Sep. 2012, Art. ID 406254.
-
(2012)
Int. J. Distrib. Sensor Netw.
, vol.2012
-
-
Du, D.1
Xiong, H.2
Wang, H.3
-
26
-
-
84874671183
-
Dynamic key management in wireless sensor networks: A survey
-
X. He, M. Niedermeier, and H. de Meer, "Dynamic key management in wireless sensor networks: A survey," J. Netw. Comput. Appl., vol. 36, no. 2, pp. 611-622, 2013.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.2
, pp. 611-622
-
-
He, X.1
Niedermeier, M.2
De Meer, H.3
-
27
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
Oct
-
G. de Meulenaer, F. Gosset, O.-X. Standaert, and O. Pereira, "On the energy cost of communication and cryptography in wireless sensor networks," in Proc. IEEE Int. Conf. Wireless Mobile Comput., Oct. 2008, pp. 580-585.
-
(2008)
Proc. IEEE Int. Conf. Wireless Mobile Comput.
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, O.-X.3
Pereira, O.4
-
28
-
-
84874297515
-
-
accessed Dec. 2014
-
(2010). Asymmetric-Key Cryptography for Contiki, http://publications.lib.chalmers.se/records/fulltext/129176.pdf, accessed Dec. 2014.
-
(2010)
Asymmetric-Key Cryptography for Contiki
-
-
-
31
-
-
84893295184
-
-
accessed Dec. 2014
-
(2013). Calculating 802.15.4 Data Rates, http://www.nxp.com/ documents/application-note/JN-AN-1035.pdf, accessed Dec. 2014.
-
(2013)
Calculating 802.15.4 Data Rates
-
-
-
32
-
-
84921354222
-
-
accessed Dec. 2014
-
(2008). A Survey of Mobility Models, http://www.cise.ufl.edu/ helmy/ papers/Survey-Mobility-Chapter-1.pdf, accessed Dec. 2014.
-
(2008)
A Survey of Mobility Models
-
-
|