SEARCH

SEARCH BY CITATION

References

  • 1
    Crossbow Technology Inc. Wireless sensor networks. http://www.xbow.com
  • 2
    Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Computer Networks 2002; 38 (4): 393422.
  • 3
    Daemen J, Rijmen V. AES proposal: Rijndael. In AES Round 1 Technical Evaluation, CD-1: Documentation NIST, August 1998.
  • 4
    Stallings W. Cryptography and Network Security: Principles and Practices (3rd edn). Pearson Education India, 2003.
  • 5
    Rivest RL. The RC5 encryption algorithm. Dr. Dobb's Journal 1995; 20 (1): 146148.
  • 6
    Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy Berkeley, California, 2003; 197213.
  • 7
    Zhu S, Setia S, Jajodia S. LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2006; 2 (4): 500528.
  • 8
    Kim YH, Lee H, Lee DH, Lim J. A key management scheme for large scale distributed sensor networks. In Proceedings of the IFIP TC6 11th International Conference PWC 2006, Lecture Notes in Computer Science, vol. 4217, Springer-Verlag, Albacete, Spain, 20–22 September 2006; 437446.
  • 9
    Blom R. An optimal class of symmetric key generation systems. In Proceeding of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques Lecture Notes in Computer Science, vol. 209, Paris, France, Springer-Verlag, 1985; 335338.
  • 10
    Matsumoto T, Imai H. On the key predistribution system: a practical solution to the key distribution problem. In Proceedings of the CRYPTO 1987, Lecture Notes in Computer Science, vol. 293, Springer-Verlag, 1987; 185193.
  • 11
    Gong L, Wheeler DJ. A matrix key-distribution scheme. Journal of Cryptology 1990; 2 (1): 5159.
  • 12
    Mitchell CJ, Piper FC. Key storage in secure networks. Discrete Applied Mathematics 1988; 21 (3): 215228.
  • 13
    Dyer M, Fenner T, Frieze A, Thomason A. On key storage in secure networks. Journal of Cryptology 1995; 8 (4): 189200.
  • 14
    Eschenauer L, Gligor VD. A key management scheme for distributed sensor networks. In The 9th ACM Conference on Computer and Communication Security November 2002; 4147.
  • 15
    Das AK, Das A, Mohapatra S, Vavilapalli S. Key forwarding: a location-adaptive key-establishment scheme for wireless sensor networks. In International Workshop on Distributed Computing (IWDC 2005), LNCS 3741 2005; 404409.
  • 16
    Liu D, Ning P, Li R. Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security 2005; 8 (1): 4177.
  • 17
    Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In 23rd Conference of the IEEE Communications Society (Infocom'04) Hong Kong, China, 21–25 March 2004; 586597.
  • 18
    Di Pietro R, Mancini LV, Mei A. Random key-assignment for secure wireless sensor networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks October 2003; 6271.
  • 19
    Ramkumar M, Memon N, Simha R. Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks. In IEEE Global Telecommunications Conference, 2003 (GLOBECOM 03) vol. 3, 2003; 14051409.
  • 20
    Ramkumar M, Memon N. An efficient random key pre-distribution scheme for MANET security. IEEE Journal on Selected Areas in Communications 2005; 23 (3): 611621.
  • 21
    Das AK. An identity-based random key pre-distribution scheme for direct key establishment to prevent attacks in wireless sensor networks. International Journal of Network Security (IJNS), 2008; 6 (2): 134144.
  • 22
    Eltoweissy M, Moharram M, Mukkamala R. Dynamic key management in sensor networks. IEEE Communications Magazine 2006; 44 (4): 122130.
  • 23
    Moharrum M, Eltoweissy M. A study of static versus dynamic keying schemes in sensor networks. In ACM Workshop on performance evaluation of Wireless Ad-hoc, Sensor and Ubiquitous Networks (PE-WASUN 2005) Montreal, Candas, October 2005; 122129.
  • 24
    Liu D, Ning P. Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 2005; 1 (2): 204239.
  • 25
    Liu D, Ning P, Du W. Group-based key pre-distribution in wireless sensor networks. In Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005) September 2005.
  • 26
    Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS) Washington DC, 27--31 October 2003; 5261.
  • 27
    Chorzempa M, Park JM, Eltoweissy M. SECK: Survivable and efficient clustered keying for wireless sensor networks. In IEEE Workshop on Information Assurance in Wireless Sensor Networks, WSNIA005 April 2005; 453458.
  • 28
    Eltoweissy M, Heydari H, Morales L, Sudborough H. Combinatorial optimizations of group key management. Journal of Networks and Systems Management 2004; 12 (1): 3050.
  • 29
    Merkle R. Secure communication over insecure channels. Communications of the ACM 1978; 21 (4): 294299.
  • 30
    Goldreich O, Goldwasser S, Micali S. How to construct random functions. Journal of the ACM 1986; 33 (4): 792807.
  • 31
    Secure hash standard. FIPS PUB 180-1 National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995.