1 |
S. Doshi and A. Eswaran, 'A Hierarchical Security Architecture for Group Communication in Sensor Network,' Project Report, 2003
|
2 |
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck and M. B. Srivastava, 'On Communication Security in Wireless Ad-Hoc Sensor Network,' Proc. of WETICE, pp.139-144, 2002
|
3 |
H. Chan and A. Perrig, 'PIKE: Peer intermediaries for key establishment in sensor networks,' Proc. of IEEE INFOCOM, 2005
|
4 |
L. Eschenhaur and V. Gligor, 'A Key-Management Scheme for Distributed Sensor Networks,' Proc. of CCS'02, pp.41-47, 2002
|
5 |
L. B. Oliveira, H. C. Wang, A. A. Loureiro, 'LHA-SP:secure protocols for hierarchical wireless sensor networks,' In 9th IFIP/IEEE International Symposium on Integrated Network Management, pp.31-44, 15-19. May. 2005
|
6 |
H. Chan, A. Perrig and D. Song, 'Random Key Predistribution Schemes for Sensor Networks, Proc. of 2003 IEEE Symposium on Security and Privacy(SP'03), pp.197-213, 2003
|
7 |
J. D. Richard and S. Mishra, 'Security Support for In-Network Processing in Wireless Sensor Network', Proc. of ACM Workshop on SASN, pp.83-93, 2003
|
8 |
Xiao Chen, Jawad Drissi, 'An Efficient Key Management Scheme in Hierarchical Sensor Network,' Mobile Adhoc and Sensor Systems Conference 2005 IEEE International Confercence, pp.6, Nov. 2005
|
9 |
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, 'Security in Mobile Ad Hoc Networks: Challenges and Solutions', IEEE Wireless Communications, Volume 11, Issue 1, pp.38 -47, Feb. 2004
|
10 |
M. Horton, et al., 'Mica: The commerciatlization of microsensor motes,' Sensors Online Magazine, April 2002. http://www.sensorsmag.com/articles/0402/40/main/shtml
|
11 |
W. Du, J. Deng and J. Katz, 'A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks,' Proc. of CCS'03, pp.27-31, 2003
|
12 |
A-S. K. Pathan, H. W. Lee, C. S. Hong, Security in Wireless Sensor Networks: Issues and Challenges, ICACT 2006, Vol.2, pp.1043-1048, Feb, 2006
|
13 |
R. Blom, 'An Optimal class of symmetric key generation systems,' Proc. of EUROCRYPT84, Lecture Notes in Computer Science, Springer-Verlag 209, pp.335-338, 1984
|
14 |
B. Lai, D. Hwang, S. Kim and I. Verbauwhede, 'Reducing Radio Energy Consumption of Key Management protocols for Wireless Sensor Networks,' Proc. of ISLPED'04, pp.351-356, 2004
|
15 |
R. Pietro, L. Mancini and A. Mei, 'Random Key Assignment for Secure Wireless Sensor Networks,' Proc of 1st Workshop Security of Ad Hoc and Sensor Networks, pp.62-71, 2003
|