References
- A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks,” ACM Communications, vol.47, no.6, pp.53-57, 2004.
- D. J. Malan, M. Welsh, and M. D. Smith, “A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,” in First IEEE Int. Conf. on Sensor and Ad Hoc Comm. and Networks, pp.71-80, 2004.
- N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and rsa on 8-bit cpus,” in CHES, pp.119-132, 2004
- A. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, “Energy analysis of public-key cryptography for wireless sensor networks,” in PerCom, pp.324-328, 2005.
- R. J. Watro, D. Kong, S. F. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “Tinypk: securing sensor networks with public key technology,” in SASN, pp.59-64, 2004.
- W. Du, R. Wang, P. Ning, “An efficient scheme for authenticating public keys in sensor networks,” in MobiHoc, pp.58-67, 2005.
- L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in ACM CCS, pp.41-47, 2002.
- J. Hwang and Y. Kim, “Revisiting random key pre-distribution schemes for wireless sensor networks,” in SASN, pp.43-52, 2004.
- A. Mohaisen, D. Nyang, T. AbuHmed, “Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks,” KSII TIIS, vol.2, no.5, pp.222-238, 2008. https://doi.org/10.3837/tiis.2008.05.001
- H. Chan, A. Perrig, and D. X. Song, “Random key pre-distribution schemes for sensor networks,” in IEEE Symposium on Security and Privacy, 2003.
- R Blom, “An optimal class of symmetric key generation systems,” in Proceeding of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques, pp.335- 338, New York, NY, USA, 1985.
- W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key pre-distribution scheme for wireless sensor networks,” ACM Trans. Inf. Syst. Secur., vol.8, no.2, pp.228-258, 2005. https://doi.org/10.1145/1065545.1065548
- C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-secure key distribution for dynamic conferences,” in CRYPTO, pp.471- 486, 1992.
- D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in ACM CCS, pp.52-61, 2003.
- D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed sensor networks,” ACM Trans. Inf. Syst. Secur., vol.8, no.1, pp.41-77, 2005. https://doi.org/10.1145/1053283.1053287
- A. Mohaisen and D. Nyang, “Hierarchical grid-based pairwise key pre-distribution scheme for wireless sensor nets,” in EWSN, pp.83-98, 2006.
- A. Mohaisen, Y. Maeng, and D. Nyang, “On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network,” in PAKDD, pp.527-5372007.
- A. Mohaisen, D. Nyang, and K. Lee, “Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks, IJNS, vol.8, no.3, pp.282-292, 2009.
- Crossbow Technology. Wireless sensor networks, http://www.xbow.com/
Cited by
- On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks vol.3, pp.4, 2009, https://doi.org/10.3837/tiis.2009.04.003
- Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks vol.7, pp.1, 2013, https://doi.org/10.1109/jsyst.2012.2188689
- A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks vol.109, pp.2, 2009, https://doi.org/10.1007/s11277-019-06608-3