Network Security Management in Wireless Networks through 3-Round Zero Knowledge Proof
Abstract
Keywords
Full Text:
PDFReferences
Mauro Conti, Luigi Vincenzo Mancini, and Alessandro Mei, “Distributed in Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing., vol. 8, no. 5,September/October 2011
L.Eschenauer and V.D.Gligor, “A Key Mauro Conti, Luigi Vincenzo Mancini, and Alessandro Mei, “Distributed Detection of Clone Attacks in Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing., vol. 8, no. L.Eschenauer and V.D.Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. mputer and Comm. Security (CCS ’02), pp. 41-47, 2002. Conf. Computer and Comm. Security (CCS ’02), pp. 41
R. Brooks, P. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M.T. Kandemir, “On the Detection of R. Brooks, P. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M.T. Kandemir, “On the Detection of Clones in
Sensor Networks Using Random Key Predistribution,” IEEE Trans. Systems, Man and Clones in Sensor Networks Using Random Key Predistribution,” IEEE Trans. Systems, Man and Cybernetics, Part C: Applications and Rev., vol. 37, no. 6, pp. 1246 cs, Part C: Applications and Rev., vol. 37, no. 6, pp. 1246-1258, Nov. 2007.
C. Bekara, M. Laurent-Maknavicius. “A new protocol for securing wireless sensor networks against Maknavicius. “A new protocol for securing wireless sensor networks againstnodes replication attacks”, In Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2007. nodes replication attacks”, In Proceedings of the 3rd IEEE International Con Mobile Computing, Networking and Communications (WiMob), 2007.
B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in SensorNetworks,” Proc. IEEE Symposium. Security and Privacy, pp. 49-63, May 2005. Networks,” Proc. IEEE Symposium. Security and Privacy, pp. 49
Detection of Clone Attacksin Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing., vol. 8, no. Management Scheme for Distributed Sensor Networks,” Proc.
R. Brooks, P. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M.T. Kandemir, “On the Detection ofClones in Sensor Networks Using Random Key Predistribution,” IEEE Trans. Systems, Man and Maknavicius. “A new protocol for securing wireless sensor networks againstference on Wireless and
Kai Xing Fang, Liu Xiuzhen, Cheng David, H. C. Du, Real-Time Detection of Clone Attacks in Wireless Sensor Networks Proceedings of the 28th International Conference on DistributedComputing Systems, 2008, Pages 3-10.
Joseph Binder, Hans Peter Bischof, Zero Knowledge Proofs of Identityfor Ad Hoc Wireless Networks An In-Depth Study,Technical Report, 2003. http://www.cs.rit.edu/ jsb7384/zkpsurvey.pdf
Klempous R.; Nikodem J.; Radosz, L.; Raus, N. ByzantineAlgorithms in Wireless Sensors Network, Wroclaw Univ. ofTechnol.,Wroclaw; Information and Automation, 2006. ICIA2006.International Conference on, 15-17 Dec. 2006, pages :319-324
A. J. Macula. A simple construction of d-disjunct matrices withcertain constant weights Discrete Math., 162(13):311-312, 1996
K. Xing, X. Cheng, L. Ma, and Q. Liang.,Superimposed Code Based Channel Assignment in Multi-radio Multi-channel Wireless Mesh Networks. In MobiCom’07, pages 15-26, 2007.
Md. Moniruzzaman, Md. Junaid ,Arafeen, Saugata Bose, Overviewof Wireless Sensor Networks: Detection of Cloned NodeUsing RM,LSN SET, Bloom filter and AICN Protocol and
Comparing H.Choi, S.Zhu, and T.Laporta.,Set: Detecting Node Clones in Sensor Networks. InSecureComm’07, 2007.
Goldreich, O., Micali, S., and Wigderson, Proofs That Yield Nothing But Their Validity Or All Languages in NP Have Zeroknowledge Proof Systems, Journal of the ACM, Vol. 38, No. 1,pp.691-729, 1991.
Tuyls, Pim T. (Mol, BE), Murray, Bruce (Eastleigh GB),Efficient Implementation of Zero Knowledge Protocols,United States NXP
B.V.(Eindhoven,NL)7555646,June2009,http://www.freepatentsonlin e.com/7555646.html.
Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Commun. SurveysTutorials, vol. 8, pp. 2–23, year 2006. (IJCSIS) International Journal of Computer Science and Information Security,Vol. 4, No. 1 & 2, 2009.
Siba K. Udgata, Alefiah Mubeen, Samrat L.Sabat Wireless sensor security model using zero knowledge protocol, 978-1-61284-233-2/11/$26.00 ©2011 IEEE.
A. G. Dyachkov and V. V. Rykov., Optimal superimposed codes and designs for Renyis Search Model. Journal of Statistical
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.