Random Pair Key Distribution Based Security in Ubiquitous Computing
Abstract
Keywords
Full Text:
PDFReferences
L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Netw. Mag., vol. 13, no. 6, pp. 24–30, Nov. 1999 .
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” WirelessNetworks, vol. 8, no. 5, pp. 521–534, 2002.
L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS ’02), pp. 41–47, November 2002.
Distributed KDC-Based Random Pairwise Key Establishment in Wireless Sensor Networks Zhong Su,1 Yixin Jiang,1 Fengyuan Ren,1 Chuang Lin,1 and Xiaowen Chu2
Scalable Method of cryptographic key management for mission critical wireless Ad-Hoc networks by Wenbo He, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, and Whay C. Lee . IEEE transaction vol1 2009.
D. Boneh and M. Franklin, “Identity based encryption from the Weil pairing,” SIAM J. Comput., vol. 32, no. 3, pp. 586–615, 2003.
D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS ’03), pp. 52–61, October 2003.
W. Du, Y. S. Han, J. Deng, and P. K. Varshney, “A pair-wise key pre-distribution scheme for wireless sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS ’03), pp. 42–51, October 2003.
D. Liu and P. Ning, “Location-based pair-wise key establishments for static sensor networks,” in Proceedings of the 1st ACMWorkshop on Security of Ad Hoc and Sensor networks, pp. 72–82, October 2003.
D. Huang, M. Mehta, D. Medhi, and L. Harn, “Locationaware key management scheme for wireless sensor networks,” in Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), pp. 29–42, October 2004.
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications2004
http://orlingrabbe.com/des.htm
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.