References
- K. Barr and K. Asanovic, 'Energy aware lossless data compression,' pp.231-244, 1st Int. Conf.Mobile Syst., Applicat., Services, May 2003 https://doi.org/10.1145/1066116.1066123
- D. Boneh, B. Lynn, and H. Shacham, 'Short signatures from the Weil pairing,' pp.514-532, in Proc, Asiacrypt' 01, Lecture Notes in Computer Science, vol. 2248, Dec. 2001 https://doi.org/10.1007/3-540-45682-1_30
- H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for sensor networks,' pp.197-213, IEEE Symposium on Security and Privacy, May 2003
- 'Digital Hash Standard,' federal information processing standards publication 180-1, Apr. 1995
- W. Du, J. Deng, Y. S. Han, S. Chen, and P.K. Varshney, 'A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,' pp.586-597, IEEE INFOCOM 04, Mar. 2004 https://doi.org/10.1109/INFCOM.2004.1354530
- W. Du, J. Deng, Y. S. Han, P.K. Varshney, J. Katz, and A. Khalili, 'A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,' pp. 228-258, ACM Transactions on Information and System Security, Aug. 2005 https://doi.org/10.1145/1065545.1065548
- L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' pp.41-47. 2002, ACM CCS 02, Nov. 2002 https://doi.org/10.1145/586110.586117
- G. Gaubatz, J. Kaps, and B. Sunar, 'Public keys cryptography in sensor networks?revisited', pp.2-18, ESAS 04, Aug. 2004
- N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, 'Comparing elliptic curve cryptography and RSA on 8-bit CPUS,' pp.119-132, CHES 04, Lecture Notes in Computer Science, vol. 3156, Aug. 2004
- D. Liu, P. Ning, and R. Li, 'Establishing Pairwise Keys in Distributed Sensor Networks,' pp.41-77, ACM Transactions on Information and System Security, Feb. 2005 https://doi.org/10.1145/1053283.1053287
- D. J. Malan, M. Welsh, and M. D. Smith, 'A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,' pp.71-80, IEEE SECON 04, Oct. 2004 https://doi.org/10.1109/SAHCN.2004.1381904
- A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'SPINS: Security protocols for sensor networks,' pp. 189-199, ACM/IEEE Intemation Conference on Mobile Computing and Networking, Jul. 200l https://doi.org/10.1145/381677.381696
- A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Chang, 'Energy analysis for public-key cryptography for wireless sensor networks,' IEEE PERCOM 05, Mar. 2005 https://doi.org/10.1109/PERCOM.2005.18
- R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, 'Tinypk: Securing sensor networks with public key technology,' pp.59-64, ACM SASN 04, Oct. 2004 https://doi.org/10.1145/1029102.1029113
- F. Ye, H. Luo, S. Lu, and L. Zhang, 'Statistical en-route filtering of injected false data in sensor networks,' vol.23, no.4, pp.839-850, IEEE JSAC, Special Issue on Self-Orgazing Distributed Collaborative Sensor Networks, Apr. 2005 https://doi.org/10.1109/JSAC.2005.843561
- Y. Zhang, W. Liu, W. Lou, and Y. Fang, 'Securing sensor networks with location-based keys,' pp.1909-1914, IEEE WCNC 05, Mar. 2005 https://doi.org/10.1109/WCNC.2005.1424811
- Y. Zhang, W. Liu, W. Lou, and Y. Fang, 'Location-based compromise-tolerant security mechanisms for wireless sensor networks,', vo1.24, no.2, pp.247-260, IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks, Feb. 2006 https://doi.org/10.1109/JSAC.2005.861382
- Y. Zhang, W. Liu, W. Lou, Y. Fang, and D. Wu, 'Secure localization and authentication in ultra-wideband sensor networks,' vol.24, no.4, pp.829-835, IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications, Apr. 2006 https://doi.org/10.1109/JSAC.2005.863855
- S. Zhu, S. Setia, S. Jajodia, and P. Ning, 'An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,' pp.259-271, Proc. IEEE Symp. Security Privacy, May 2004 https://doi.org/10.1109/SECPRI.2004.1301328
Cited by
- Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 vol.17C, pp.1, 2010, https://doi.org/10.3745/KIPSTC.2010.17C.1.001