Practical Attacks on Hybrid Group Key Management for SOHAN |
Liew, Jiun-Hau
(Graduate School Design and IT of Dongseo University)
Ong, Ivy (Graduate School of Design and IT in Dongseo University) Lee, Sang-Gon (Division of Computer & Information Engineering, Dongseo University) Lim, Hyo-Taek (Division of Computer and Information Engineering) Lee, Hoon-Jae (School of Computer and Information Engineering at Dongseo University.) |
1 | S.Y. Lim, M.H. Lim, S.G. Lee, and H.J. Lee, "Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network," Proc. of the Fourth International Conference on Information Assurance and Security, 2008, pp. 43-49. |
2 | C. Su, K. Chang, Y. Kuo, and M. Horng, "The New Intrusion Prevention and Detection Approaches for Clustering-Based Sensor Networks," IEEE Wireless Communications and Networking Conference, vol. 4, 2005, pp. 1927-1932. |
3 | S. Ganu, L. Raju, B. Anepu, I. Seskar, and D. Raychaudhuri, "Architecture and Prototyping of an 802.11-based Self-Organizing Hierarchical Ad-Hoc Wireless Network (SOHAN)," Proc. of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 2, 2004, pp. 880-884. |
4 | T. Park and K.G. Shin, "LiSP: A Lightweight Security Protocol for Wireless Sensor Networks," ACM Transactions on Embedded Computing Systems, vol. 3, no. 3, 2004, pp. 634-660. DOI |
5 | J. Ibriq and I. Mahgoub, "Cluster-Based Routing in Wireless Sensor Networks: Issues and Challenges," Proc. of the 2004 Sym. on Performance Evaluation of Computer Telecommunication Systems, 2004, pp. 759-766. |
6 | M. Burmerster and Y. Desmedt, "A Secure and Scalable Group Key Exchange System," Information Processing Letter, vol. 94, no. 3, 2005, pp. 137-143. DOI ScienceOn |
7 | D. Carman, B. Matt, and G. Cirincione, "Energy-efficient and Low-latency Key Management for Sensor Networks," Proc. of 23rd Army Science Conference, 2002. |
8 | S. Zhu, S. Setia, S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed MSN Networks," Proc. of ACM conference on Computer and Communication Security, 2003, pp. 62-72. |