1 |
R. Anderson, H. Chan, and A. Perrig, 'Key Infection : Smart Trust for Smart Dust,' In 12th IEEE International Conference on Network Protocols, pp.206- 215, October 2004
|
2 |
H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for sensor networks,' In IEEE Symposium on Security and Privacy, pp. 197-213, May 2003
|
3 |
H. Chan and A. Perrig, 'Security and Privacy in Sensor Networks,' IEEE Computer, Vol.36, No.10, pp. 103-105, October 2003
|
4 |
L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' In Proceedings of the 9th ACM conference on Computer and communications security, pp.41-47, November 2002
|
5 |
S. Zhu, S. Setia, and S. Jajodia. 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' CCS'03, Washington, DC, USA. October 27-31, 2003
|
6 |
M. Bellare, J. Kilian, and P. Rogaway, 'The security of the cipher block chaining message authentication code,' Journal of Computer and System Sciences, Vol. 61, No. 3, pp. 362-399, December 2000
DOI
ScienceOn
|
7 |
R. Blom, 'An optimal class of symmetric key generation systems,' In Proceedings of EUROCRYPT `84, LNCS Vol. 209, pp.335-338, 1985
|
8 |
D. W. Carman, P. S. Kruus, and B. J. Matt, 'Constraints and approaches for distributed sensor network security,' NAI Labs Technical Report 00-010, September 2000
|
9 |
D. Liu, P. Ning, and R. Li, 'Establishing Pairwise Keys in Distributed Sensor Networks,' ACM Transactions on Information and System Security, pp.41-77, February 2005
|
10 |
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'A survey on sensor networks,' IEEE Communications Magazine, Vol. 40, No. 8, pp. 102-114, August 2002
|
11 |
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, 'Perfectly-secure key distribution for dynamic conferences,' In Proceedings of CRYPTO `93, LNCS Vol. 740, pp. 471-486, 1993
|
12 |
Zigbee Alliance, 'Security Services Specification Revision 13', ZigBee Alliance Board of Directors, December 14th, 2004
|
13 |
A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'SPINS: Security protocols for sensor networks,' In Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking, pp.189- 199, July 2001
|
14 |
W. Du, J. Deng, Y. S. Han, S. Chen, and P.K. Varshney, 'A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,' In Proceedings of the IEEE INFOCOM `04, pp. 586-597, March 2004
|
15 |
W. Du, J. Deng, Y. S. Han, P.K. Varshney, J. Katz, and A. Khalili, 'A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,' ACM Transactions on Information and System Security, pp.228-258, August 2005
|