

Analysis of Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management
Abstract
Keywords
References
Kemal a and Mohamed y. a Survey on Protocols for WSNs. Commu-nications Magazines, 2002, 40(8), pages 102-114.
w. Heinzelman, a. Chandrakasan, h. Balakrishnan, Energy-efficient com-munication protocol for WSNs, in: Proceeding of the Hawaii International Conference System Sciences, Hawaii, January 2000.
s. Lindsey, c.s. Raghavendra, pegasis: power efficient gathering in sensor information systems, in: Proceedings of the ieee Aerospace Conference, Big Sky, Montana, March 2002.
m. Younis, m. Youssef, k. Arisha, Energy-aware in cluster-based sensor networks, in: Proceedings of the 10th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS2002), Fort Worth, TX, October 2002.
Eschenauer L, Gligor V D. A key management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security. USA: ACM, pages 41-47, 2002.
Chan H, Perrig A, Song D. Random key pre-distribution schemes for sensor networks. In Proceedings of the IEEE Computer Society Symposium on Security and Privacy. Piscataway, USA: IEEE, pages 197-213, 2003.
Kejie Lu, Yi Qian, Mohsen Guizani and Hsiao-Hwa Chen. A framework for a distributed key management scheme in heterogeneous WSNs.Wireless Communications, IEEE Transactions on Volume 7, Issue 2, Pages: 639- 647, February 2008.
Yun Zhou and Yuguang Fang. A Two-Layer Key Establishment Scheme for WSNs. Mobile Computing, IEEE Transactions on Volume 6, Issue 9, Pages: 1009 - 1020, Sept. 2007.
Wenliang Du, Jing Deng, Yunghsiang S.Han, Pramod K.Varshney. A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Transactions on Dependable and Secure Computing, Vol.3, NO.1, pages 62-77, January-March 2006.
Leonardo B. Oliveira, Hao C. Wong, M. Bern, A. A. F. Loureiro. SecLEACH-A Random Key Distribution Solution for Securing Clustered Sensor Networks. The Fifth IEEE International Symposium on Network Computing and Applications (NCA’06), 2006.
Energy Efficient key management protocol in wireless sensor networks, Jhunsu Kim and Jhunyung Lee. International Journal of Security and Its Applications ,Vol. 4, No. 2, April, 2010
Eschenauer and V. D. Gligor, “A key management scheme for distributed sensor networks”, In 9th ACM conference on Computer and communications security, 2002, pp. 41-47.
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key pre-distribution scheme for wireless sensor networks”, ACM Transactions on Information and System Security, Vol. 8, 2005, pp 228-258.
J. Hwang and Y. Kim, "Revisiting random key predistribution schemes for sensor networks," In 2nd ACM workshop on Security of ad hoc and networks, pp. 43-52, 2004.
D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed sensor networks”, ACM Transactions on Information and System Security (TISSEC), Vol. 8, 2005, pp. 41-77.
S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks”, In 10th ACM conference on Computer and communication security, 2003, pp. 62-72.
T. Moore, “A Collusion Attack on Pair-wise Key Predistribution Schemes For Distributed Sensor Networks”, proceedings of the Fourth Annual IEEE International Conference Pervasive Computing and Communications Workshops (PERCOMW06), Mar. 2006, pp. 13-17.
C. Hartung, J. Balasalle and R. Han, “Node Compromise in Sensor Networks: The Need for Secure Systems”, Technical Report CU-CS-990-05, Jan. 2005.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.