SEARCH

SEARCH BY CITATION

References

  • 1
    Liu A, Ning P. TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in Proceedings of the 7th IPSN, Washington, DC, USA, 2008.
  • 2
    Piotrowski K, Langendoerfer P, Peter S. How public key cryptography influences wireless sensor node lifetime, in Proceedings of the 4th ACM SASN, New York, 2006.
  • 3
    Papadimitratos P, Luo J, Hubaux J-P. A randomized countermeasure against parasitic adversaries in wireless sensor networks. IEEE Journal on Selected Areas in Communications 2010; 28: 10361045.
  • 4
    Hartung C, Balasalle J, Han R. Node compromise in sensor networks: the need for secure systems. Technical Report CU-CS-990-05, University of Colorado at Boulder, 2005.
  • 5
    Bohli J, Papadimitratos P, Verardi D, Westhoff D. Resilient data aggregation for unattended WSNs, in IEEE LCN SenseApp, Bonn, Germany, October 2011; 9941002.
  • 6
    Newsome J, Shi E, Song D, Perrig A. The sybil attack in sensor networks: analysis & defenses, in Proceedings of the 3rd IEEE International Symposium on Information Processing in Sensor Networks, New York, 2004; 259268.
  • 7
    Du W, Deng J, Han YS, Varshney PK. A pairwise key pre-distribution scheme for wireless sensor networks, in Proceedings of the 10th ACM conference on Computer and communications security, New York, 2003; 4251.
  • 8
    Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM conference on Computer and Communications Security (CCS), New York, 2002; 4147.
  • 9
    Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks, in Proceedings of the 2003 IEEE Symposium on Security and Privacy, Washington, DC, USA, 2003; 197213.
  • 10
    Ehdaie M, Alexiou N, Ahmadian M, Aref M, Papadimitratos P. Key splitting for random key distribution schemes, in Proceedings of the 7th workshop on Secure Network Protocols (NPSec), Austin, Texas, USA, 2012.
  • 11
    Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks. Communications of the ACM 2004; 47: 5357.
  • 12
    Giruka VC, Singhal M, Royalty J, Varanasi S. Security in wireless sensor networks. Wireless Communications and Mobile Computing 2008; 8(1): 124.
  • 13
    Shi E, Perrig A. Designing secure sensor networks. Wireless Communications, IEEE 2004; 11: 3843.
  • 14
    Wood AD, Stankovic JA, D A, A J. Denial of service in sensor networks, in Upper Saddle River, Prentice Hall, Inc, 2002.
  • 15
    Poturalski M, Papadimitratos P, Hubaux J-P. Towards provable secure neighbor discovery in wireless networks, in ACM Workshop on Formal Methods in Security Engineering, Alexandria, VA, USA, October 2008; 3142.
  • 16
    Poturalski M, Papadimitratos P, Hubaux J-P. Secure neighbor discovery in wireless networks: formal investigation of possibility, in ACM Symposium on Information, Computer and Communications Security (ASIACCS), Tokyo, Japan, March 2008; 189200.
  • 17
    Douceur JR. The sybil attack, in Revised Papers from the First International Workshop on Peer-to-Peer Systems, London, UK, 2002; 251260.
  • 18
    Liu D, Ning P. Establishing pairwise keys in distributed sensor networks, in Proceedings of the 10th ACM conference on Computer and Communications Security (CCS), New York, 2003; 5261.
  • 19
    Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks, in Security and Privacy, 2005 IEEE Symposium on, Oakland, California, US, may 2005; 4963.
  • 20
    Moore T. A collusion attack on pairwise key predistribution schemes for distributed sensor networks, in Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on, Pisa, Italy, March 2006; 5255.
  • 21
    Papadimitratos P, Deng J. Stealthy pre-attacks against random key pre-distribution security, in Proceedings of the IEEE International Conference on Communications - Communication and Information Systems Security Symposium (ICC'12 CISS), Ottawa, Canada, 2012; 251260.
  • 22
    Kur J, Matyas V, Svenda P. Two improvements of random key predistribution for wireless sensor networks, in Proceedings of the International Conference on Security and Privacy in Communication Networks, Padua, Italy, 2012.
  • 23
    Huang S-I, Shieh S, Wu S. Adaptive random key distribution schemes for wireless sensor networks, Computer Security in the 21st Century, Springer, 2005; 91105.
  • 24
    Zhao H, Hu J, Qin J, Varadharajan V, Wan H. Hashed random key pre-distribution scheme for large heterogeneous sensor networks, in Procee-dings of the IEEE 11th International Confe-rence on Trust, Security and Privacy in Computing and Communications, Liverpool, 2012; 706713.
  • 25
    Du W, Deng J, Han YS, Chen S, Varshney P. A key management scheme for wireless sensor networks using deployment knowledge, in Proceedings of the IEEE INFOCOM 2004, 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Washington, DC, 2004; 586597.
  • 26
    Levi A, Tasci S, Lee Y, Lee Y, Bayramoglu E, Ergun M. Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools. Intelligent Manufacturing Springer 2010; 21(5): 635645.