1 |
A. Hajami, K. Oudidi, and M. Elkoutbi, "A Distributed Key Management Scheme based on Multi hop Clustering Algorithm for MANETs," International Journal of Computer Science and Network Security, vol. 10, no. 2, pp.39-49, Feb., 2010.
|
2 |
Seungjin Han, "A Pair-wise Key Agreement Scheme for Cluster-Based Sensor Networks," Journal of Kyungin Women's College, vol. 16, pp301-312, Kyungin Women's College, Jan., 2009.
|
3 |
W. Diffie and M. Hellman, "New Directions on Cryptography," IEEE Transactions on Information Theory, IT-22(6): pp. 644-654, Nov., 1976.
|
4 |
M. Healy, T. Newe, and E. Lewis, "Security for Wireless Sensor Networks: A Review," SAS 2009 - IEEE Sensors Applications Symposium, New Orleans, LA, USA, Feb., 17-19, 2009.
|
5 |
W. R. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," Proc., 33rd Hawaii Int'l. Conf. Sys. Sci., Jan., 2000.
|
6 |
W. R. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Trans. Wireless Communication, vol. 1, no. 4, Oct., 2002.
|
7 |
O. Younix and S. Fahmy, "Distributed Clustering in Ad-hoc Sensor Networks : A Hybrid, Energy-Efficient Approach," IEEE INFOCOM, Mar., 2004.
|
8 |
J.S Kim, Energy Efficient and Secure Cluster-based Routing Protocol in Wireless Sensor Networks, Ph.D. Dissertation, Inha Univ., Feb., 2010.
|
9 |
Seungjin Han, J.H. Choi, "A Robust Pair-wise Key Agreement Scheme without Trusted Third Party and Pre-distributing Keys for MANET Environments," Journal of The Korea Society of Computer and Information, KSCI, vol. 13, no. 5, Sep., 2008.
|
10 |
J. S. Lee, et. al., "Energy Efficient Cluster Management Scheme for Ubiquitous Sensor Networks," International Conference on Computational Sciences and Its Applications, ICCSA 2008, pp. 73-83, 2008.
|
11 |
S.H Seo, T.N Cho, and S.H Lee, "OTP-EKE: A Key Exchange Protocol based on One-Time-Password," Journal of The Korean Institute of Information Scientists and Engineersm : System and Theory , vol. 29, no. 5, KIISE, June, 2002.
|
12 |
C. C. Chang, K. C. Lin and J. S. Lee, "DH-Based Communication Method for Cluster-Based Ad Hoc Networks," 2nd International Conference on Mobile Technology, Applications and Systems, 15-17, Nov., 2005.
|
13 |
Wenbo Mao, Modern Cryptography : Theory and Practice, Prentice Hall, July, 2003.
|
14 |
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishment pair-wise keys for secure communication in ad hoc networks: a probabilistic approach," In Proceedings of the 11th International Conference on Network Protocols, pp. 326-335, 2003.
|