SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Aysal TC, Barner KE. Sensor data cryptography in wireless sensor networks. IEEE Transactions on Information Forensics and Security 2008; 3(2): 273289.
  • 2
    Giruka VC, Singhal M, Royalty J, Varanasi S. Security in wireless sensor networks. Wireless Communications and Mobile Computing 2008; 8(1):124.
  • 3
    Kundur D, Luh W, Okorafor UN, Zourntos T. Security and privacy for distributed multimedia sensor networks. Proceedings of the IEEE 2008; 96(1): 112130.
  • 4
    Wang Y, Attebury G, Ramamurthy B. A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials 2006; 8(2): 223, Second Quarter.
  • 5
    Abouei J, Plataniotis KN, Pasupathy S. Green modulations in energy-constrained wireless sensor networks. IET Communications 2011; 5(2): V240V251.
  • 6
    Huang C-F, Tseng Y-C. A survey of solutions to the coverage problems in wireless sensor networks. Journal of Internet Technology 2005; 6(1):18.
  • 7
    Akyildiz IF, Su W, Sankarasubramanian Y, Cayirci E. A survey on sensor networks. IEEE Communications Magazine 2002; 40(8): 102114.
  • 8
    Blom R. An optimal class of symmetric key generation systems. In Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1984.
  • 9
    Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly-secure key distribution for dynamic conferences. In Proceedings of the 29th International Cryptology Conference (CRYPTO), 1993.
  • 10
    Eschenauer L, Gligor V. A key-management scheme for distributed sensor networks. In Proceedings of the Annual ACM Computer and Communications Security (CCS), 2002.
  • 11
    Merkle RC. Secure communications over insecure channels. Communication of ACM 1978; 21(4): 294299.
  • 12
    Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2003.
  • 13
    Deng J, Han YS. Multi-path key establishment for wireless sensor networks using just enough redundancy transmission. IEEE Transactions on Dependable and Secure Computing 2008; 5(3):177190.
  • 14
    Du W, Deng J, Han YS, Varshney P. A pairwise key pre-distriubtion scheme for wireless sensor networks. In Proceedings of the Annual ACM Computer and Communications Security (CCS), 2003.
  • 15
    Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of the Annual ACM Computer and Communications Security (CCS), 2003.
  • 16
    Çamtepe SA, Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transaction on Networking 2007; 15(2): 346358.
  • 17
    Lee J, Stinson DR. On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Transactions on Information and System Security (TISSEC) 2008; 11(2): 5:15:35.
  • 18
    Çamtepe SA, Yener B, Yung M. Expander graph based key distribution mechanisms in wireless sensor networks. In Proceedings of IEEE International Conference on Communications (ICC), 2006.
  • 19
    Chan H, Perrig A. PIKE: peer intermediaries for key establishment in sensor networks. In Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM), 2005.
  • 20
    Tague P, Poovendran R. A canonical seed assignment model for key predistribution in wireless sensor networks. ACM Transactions on Sensor Networks 2007; 3(4): Article 19.
  • 21
    Pietro RD, Mancini LV, Mei A. Efficient and resilient key discovery based on pseudo-random key pre-deployment. In Proceedings of International Parallel and Distributed Processing Symposium (IPDPS)—Workshop 12, 2004.
  • 22
    Tsai S-C, Tzeng W-G, Zhou K-Y. Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8(3): 12181222.
  • 23
    Deng J, Han YS. Babel: using a common bridge node to deliver multiple keys in wireless sensor networks. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), 2007.
  • 24
    Law C-F, Hung K-S, Kwok Y-K. A novel key redistribution scheme for wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC), 2007.
  • 25
    Zhang W, Tran M, Zhu S, Cao G. A random perturbation-based scheme for pairwise key establishment in sensor networks. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), September 9–14, Montreal, QC, Canada, 2007.
  • 26
    Yu C-M, Lu C-S, Kuo S-Y. Noninteractive key establishment scheme for sensor networks. IEEE Transactions on Information Forensics and Security 2010; 5(3): 556569.
  • 27
    Zhao J, Govindan R. Understanding packet delivery performance in dense wireless sensor networks. In Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys), 2003.
  • 28
    Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the Annual ACM Computer and Communications Security (CCS), 2003.
  • 29
    Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM), 2004.
  • 30
    Huang D, Medhi D. Secure pairwise key establishment in large-scale sensor networks: an area partitioning and multigroup key predistribution approach. ACM Transactions on Sensor Networks (TOSN) 2007; 3(3): Article 16.
  • 31
    Huang D, Mehta M, Medhi D, Harn L. Location-aware key management scheme for wireless sensor networks. In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2004.
  • 32
    Liu D, Ning P, Du W. Group-based key predistribution for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 2008; 4(2): 11:111:30.
  • 33
    Ruj S, Roy B. Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 2009; 6(1): Article 4.
  • 34
    Yu Z, Guan Y. A key management scheme using deployment knowledge for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 2008; 19(10): 14111425.
  • 35
    Younis MF, Ghumman K, Eltoweissy M. Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Transactions on Parallel and Distributed Systems 2006; 17(8): 865882.
  • 36
    Chan S, Poovendran R, Sun M. A key management scheme in distributed sensor networks using attack probabilities. IEEE Global Communications Conference, Exhibition & Industry Forum (Globecom), 2005.
  • 37
    Liu F, Cheng X. LKE: a self-configuring scheme for location-aware key establishment in wireless sensor networks. IEEE Transactions on Wireless Communications 2008; 7(1): 224232.
  • 38
    Martin KM, Paterson MB, Stinson DR. Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Transactions on Sensor Networks (TOSN) 2010; 7(2): Article 11.
  • 39
    Mi Q, Stankovic JA, Stoleru R. Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. ACM Conference on Wireless Network Security (WiSec), 2010.