References
- L. Eschenauer and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. 9th ACM Conf. Comput. Comm. Security, 2002, pp. 41-47.
- W. Du et al., "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," Proc. 10th ACM Conf. Comput. Comm. Security, 2003, pp. 42-51.
- R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Adv. Cryptology: Proc. EUROCRYPT'84, 1985, pp. 335-338.
- D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," Proc. 10th ACM Conf. Comput. Comm. Security, 2003, pp. 52-61.
- W. Du et al., "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," Proc. IEEE INFOCOM, 2004, pp. 586-597.
- A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Proc. Wireless Netw., vol. 8, Sept. 2002, pp. 521-534. https://doi.org/10.1023/A:1016598314198
- G. Gaubatz et al., "State of the Art in Ultra-low Power Public Key Cryptography for Wireless Sensor Networks," Proc. Third IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, 2005, pp. 146-150.
- A.S. Wander et al., "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, 2005, pp. 324-328.
- X. Li et al., "A Key Distribution Scheme Based on Public Key Cryptography for Wireless Sensor Networks," Proc. Int. Conf. Computational Intelli. Security, ICCIAS, 2006, pp. 1113-1116.
- G. Murphy et al., "Hardware-Software Implementation of Public- Key Cryptography for Wireless Sensor Networks," Proc. Irish Signals Syst. Conf., Dublin, Ireland, 2006, pp. 463-468.
- G. Murphy et al., "Hardware-Software Implementation of Public- Key Cryptography for Wireless Sensor Networks," Proc. Irish Signals Syst. Conf., Dublin, Ireland, 2006, pp. 463-468.
- M. Pugliese and F. Santucci, "Pair-Wise Network Topology Authenticated Hybrid Cryptographic Keys for Wireless Sensor Networks Using Vector Algebra," Proc. 5th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst., 2008, pp. 853-859.
- J. Yao, "A Security Architecture for Wireless Sensor Networks Based-On Public Key Cryptography," Proc. Int. Conf. Wireless Comm. Networking Mobile Comput., 2009, pp. 1-3.
- J.W. Jiang and J.H. Liu, "Research on Key Management Scheme for WSN Based on Elliptic Curve Cryptosystem," Proc. 1st Int. Conf. Networked Digital Technol., 2009, pp. 536-540.
- P. Szczechowiak et al., "NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks," Lect. Notes Comput. Sci., vol. 4913, 2008, pp. 305-320.
- T.H. Shan and C.M. Liu, "Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks," Proc. Asia-Pacific Services Comput. Conf., 2008, pp. 1127-1131.
- N. Gura et al., "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," Proc. 6th Int. Workshop Cryptographic Hardware Embedded Syst., Boston, Mass., vol. 3156. Aug. 2004, pp. 925-943.
- D. Malan, M. Welsh, and M.D. Smith, "A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography," Proc. 1st IEEE Int. Conf. Commun. Netw., Santa Clara, CA, Oct. 2004.
- William Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed., New York: Prentice Hall, 2002.
Cited by
- Flight Protection Data via Dynamic Sensor Networks vol.10, pp.2, 2011, https://doi.org/10.1155/2014/509313
- An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks vol.11, pp.9, 2011, https://doi.org/10.1155/2015/691498
- Efficient Group Key Management for Non-reliable Link Networks vol.98, pp.2, 2011, https://doi.org/10.1007/s11277-017-4956-y
- Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices vol.40, pp.3, 2018, https://doi.org/10.4218/etrij.2017-0220
- Group Key Management Scheme for Multicast Communication Fog Computing Networks vol.8, pp.10, 2011, https://doi.org/10.3390/pr8101300