1 |
M. Horton, et al., 'Mica: The commerciatlization of microsensor motes,' Sensors Online Magazine, April 2002 http://www.sensorsmag.comiarticles/0402/40/main/shtml
|
2 |
D. Carman, P. Kruus, and B. Matt, 'Constraints and approaches for distributed sensor network security,' Tech. Rep. 00-010, NAI Labs, September 2000. http://download.nai.com/produets/media/nai/zip/nailabs-report-00-010-final.zip
|
3 |
Network simulator. Available in http://www.isi.edu/nsnam/ns, January 2003
|
4 |
C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii, 'On key distrubution and authentication in mobile radio networks,' Advances in Cryptology - euroCrypt'93, pp. 461-465, 1993, INCS Volume 765, Springer-verlag
|
5 |
A. Khalili, et al., 'Toward Secure key Distribution in Truly Ad-Hoc Networks,' IEEE SAINT'03, pp. 342-346, Jan. 2003
|
6 |
D. Boneh, et al., 'Identity-based Encryption from the Weil Pairing,' CRYPTO 2001, vol. 2139, pp. 213-229, Aug. 2001
|
7 |
I. zHOU, ET AL., 'Securing Ad Hoc Networks,' IEEE Network Magazine, 13(6), Nov./Dec. 1999
DOI
ScienceOn
|
8 |
L. Venkatraman et al., 'A Novel Authentication Schemes Ad Hoc Networks,' IEEE WCNC' 2000, vol.3, pp. 1268-1273, 2000
DOI
|
9 |
Gupta G, Younis M, 'Performance Evaluation of Load-Balanced Clustering in Wireless Sensor Networks' In the proc. of l0th International Conference on Telecommunications (ICT 2003), Tahiti, French Polynesia, Feb. 2003
DOI
|
10 |
M. Tatebayashi, N. Matsuzaki, and D. B. Newman, 'Key distribution protocol for digital mobile communication systems,' Advances in CryptologyCRYPTO'89, pp. 324-334, 1989, LNCS Volume 435, Springer-verlag
|
11 |
A. Perrig, R: Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'Spins: Security protocols 'for sensor networks,' in Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, July 2001, pp. 189-199
DOI
|
12 |
S. Zhu, S. Setia, and S. Jajodia, 'A distributed group key managemet protocol for ad hoc networks,' Unpublished manuscript, George Mason University, Dec. 2002
|
13 |
H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for Sensor networks,' In IEEE Symposium on Research in Security and Privacy, May, 2003, pp. 197-213
|
14 |
L. Echenauer and V. D. Gligor, 'A Key-Management scheme for Distributed sensor networks,' In Proceedings of the 9th Computer Communication Security, Nov. 2002, pp. 41-47
DOI
|
15 |
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti 'Secure pebblenets,' In Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, ACM Press, 2001, pp. 156-163
DOI
|
16 |
김복순, 조기환, 이행곤, 박병연, '센서 네트워크에서 랜덤 키 체인을 활용한 단대단 키 협의 방안', 한국통신학회 추계종합 학술발표논문집, 28, 2003. pp. 1-12
|
17 |
L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' in Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, November 18-22, 2002, pp. 41-47
DOI
|
18 |
T. Dimitriou, I. Krontiris, and F. Nikakis, 'Key establishment in sensor networks with resiliency against node capture and replication,' December 2003. Submitted to 5th ACM Symposium on Mobile Ad Hoc Networking and Computing, (MobiHoc) 2004
|
19 |
B. C. Neuman and T. Tso, 'Kerberos: An authentication service for computer networks,' IEEE Communications, vol. 32, no. 9, pp. 33-38, September 1994
DOI
ScienceOn
|
20 |
R. L. Rivest, A. Shamir, and L. M. Adleman, 'A method for obtaining digital signatures and public-key cryptosystems,' Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978
DOI
ScienceOn
|
21 |
W. Fumy and P. Landrock, 'Principles of key management,' IEEE Journal of Selected Areas in Communications, vol. 11, pp. 785-793, June 1993
DOI
ScienceOn
|
22 |
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'A survey on sensor networks,' IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, August 2002
DOI
ScienceOn
|
23 |
J. M. Kahn, R. H. Katz, and K. S. J. Pister, 'Next century challenges: Mobile networking for smart dust,' in Proceedings of the 5th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), 1999, pp. 483-492
DOI
|
24 |
W. Diffie and M. E. Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, vol. 22, pp. 644-654, November 1976
DOI
|
25 |
W. Heinzelman, A. Chandrakasan, H. Balakrishnan, 'Energy Efficient Communication protocol for Wireless Microsensor Networks,' Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, pp. 3005-3014, Jan. 2000
|