1 |
W. S. Juang, "Efficient User Authentication and Key Agreement in Wireless Sensor Networks", WISA 2007, LNCS 4298, pp. 15-29, Springer-Verlag, 2007.
|
2 |
J.Ibriq and Imad Mahgoub, "A Hierarchical key establishment scheme or Wireless sensor networks", Proceedings of 21st International conference on advanced Networking and applications(AINA07), pp.210-219, 2007
|
3 |
W. S. Juang, "Efficient User Authentication and KeyAgreement in Wireless Sensor Networks", WISA 2007, LNCS 4298, pp. 15-29, Springer-Verlag, 2007.
|
4 |
T.T Huyen, Eui-Nam huh, "A reliable 2-mode authentication framework for Ubiquitous sensor network", Journal of Korean Society for Internet Information, 2008
|
5 |
N. T.T. Huyen and E. Huh. "An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network. In ICUIMC '08, page 441-447, 2008
|
6 |
Sung-Hwa Hong and Byoung-Kug Kim,"Flooding Level Cluster-based Hierarchical Routing Algorithm For Improving Performance in Multi-Hop Wireless Sensor Networks", Journal of korea information and communications society, Vol 33,No3, pp pp123-134, 2008
|
7 |
Boseung Kim, Huibin Lim,Jongseok Choi and Yongtae Shin,"A Study on Node Authentication Mechanism using Sensor Node's Energy Value in WSN" Journal of The Institute of Electronics Engineers of Korea, Vol 48-CI, No2, pp 86-95, 2011
|
8 |
L.Eschenauer and V.D.Gligor, "A key management scheme for distrivuted sensor networks" In 9th ACM conference on computer and communications security , pp. 41-47, 2002
|
9 |
W. Ke, P. Basu, S. Abu Ayyash, and T.D.C. Little, "Attribute Based Hierarchical Clustering in Wireless Sensor Networks", MCL Technical Report No. 03-24-2003
|
10 |
Seema Bandyopadhyay and Edward J. Coyle, "An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks", INFOCOM2003
|
11 |
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks", Wireless Networks, Vol. 8. No. 5, pp. 521-534, 2002.
DOI
ScienceOn
|
12 |
Q. Huang, J. Cukier, H. Kobauashi, B. Liu and J.Zhang, "Fast Authenticated Key Establishment Protocols for Self-organizing Sensor Networks", InProc. of the 2nd SCM International Conference on Wireless Sensor Networks and Applications, pp.141-150, 2003.
|
13 |
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks", In 10th ACM Conference on Computer and Communication Security(CCS), 2003.
|
14 |
H. Chan, A. Perrig, "PIKE:Peer Intermediaries for Key Establishment in Sensor Networks", IEEE Infocom, Vol. 1, pp. 524-535, 2005.
|
15 |
R.M.S. Silva, N.S.A.Pereira, M.S.Nunes, "Applicability Drawbacks of Probabilistic Key Management Schemes for Real World Applications of Wireless Sensor Networks",. Proceeding of the Third International Conference on Wireless and Mobile Communication(ICWMC'07), pp.51-58, 2007
|