Performance Analysis of Individual Pair-wise Cluster Key Management Scheme for Wireless Sensor Network
Abstract
Keywords
Full Text:
PDFReferences
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A Survey”, Computer Networks Journal, Elsevier Science, Vol. 38, No. 4 pp 393–422 (2002).
Kausar F., Hussain S., Yang L. T., Masood A., “Scalable and Efficient key management for heterogeneous sensor networks.”, Journal of Supercomputing, Vol 45, p.p. 44-65 (2008).
Gunnar Gaubat, Jens-Peter Kaps, Berk Sunar, “Public Key Cryptography in Sensor networks- Revisited”, Lecture Notes in Computer Science, Vol. 3313, pp. 2-18 (2005).
Naveen Sastry, David Wagner, “Security Consideration for IEEE802.15.4 Networks”, Proc. 3rd ACM Workshop on Wireless Security, pp. 32-42 (2004)
Jing Deng, Richard Han, Shivakant Mishra,”Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks”, Proc. 5th ACM International conference on Information processing in sensor networks, pp. 292-300 (2006).
Cauligi S. Raghavendra,”PEGASIS: Power- Efficient Gathering in Sensor Information System”, Proc. IEEE Aerospace Conference, Volume 3, pp. 1125 – 1130 (2002).
Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, “SPINS:Security Protocols for Sensor Networks”, ACM Journal of Wireless N/W, Kluwer Academic Publishers, Vol 8, pp. 521-534 (2002).
Sencun Zhu, Sanjeev Setia, Sushil Jajodia,”LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks”, ACM Transactions on Sensor Networks, Vol 2, Issue 4, pp. 500-528 (2006).
Chris karlof, Naveen Sastry, David Wanger, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Proc. 2nd International Conference on Embedded networked sensor systems, pp. 162- 172 (2004).
J. C .Lee, Victor C., M. Leung, Kirk H. Wong, Jiannog Cao, and Henry C. B. Chan, “Key Management Issues In Wireless Sensor Networks: Current Proposals And Future Developments”, IEEE Transactions on Wireless Communications, Vol. 14, Issue 5, pp. 76-84 (2007).
J. Sen, “A Survey on Wireless sensor Network Security”, International Journal of Communication Networks and Information Security(IJCNIS), Vol.1, No. 2, p.p. 59-82 (2009).
Guohua Ou; Jie Huang; Juan Li , “A key-chain based key management scheme for heterogeneous sensor network” Proc. IEEE International Conference on Information Theory and Information Security, pp. 358 – 361 (2010).
Sharma, K.; Sharma, N.; Prasad, D.; Patel, R.B., “Flexible and efficient scheme for static wireless sensor networks” Proc. 2nd International Conference on Computer Engineering and Technology, Vol. 6, pp. 37 - 41 (2010)
Xuemei You, “Study on key distribution scheme for wireless sensor networks”, Proc. 2nd IEEE International Conference on Computer Engineering and Technology, Vol. 2, pp. 675 - 678 (2010).
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.