

An Novel Key Cryptography for Signature Depreciation in Wireless Sensor Networks
Abstract
Keywords
References
Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114, 2002.
C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, “Directed diffusion for wireless sensor networking,” IEEE/ACM Trans. Networking, vol. 11, no. 1, pp. 2–16, 2003.
J. W. Hui and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale,” in Proc. 2004 ACM SenSys, pp. 81–94.
W. Heinzelman, A. Chandrakasan, and H. Balakrihnan, “Energyefficient communication protocol for wireless microsensor networks,” in Proc. 2000 Hawaii International Conference on System Sciences, vol. 2, 2000.
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: securing sensor networks with public key technology,” in Proc. 2004 ACM SASN, pp. 59–64.
C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003.
Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521–534, 2002.
D. Liu and P. Ning, “Multilevel μTESLA: broadcast authentication for distributed sensor networks,” ACM Trans. Embeded Computing Syst., vol. 3, no. 4, pp. 800–836, 2004.
Y. Zhou and Y. Fang, “BABRA: batch-based broadcast authentication in wireless sensor networks,” in Proc. 2006 IEEE GLOBECOM.
P. Ning, A. Liu, and W. Du, “Mitigating DoS attacks against broadcast authentication in wireless sensor networks,” ACM Trans. Sensor Networking, vol. 4, no. 1, pp. 1–35, 2008.
T. Kwon and J. Hong, “Secure and efficient broadcast authentication in wireless sensor networks,” IEEE Trans. Computers, vol. 59, no. 8, pp. 1120–1133, 2010.
K. Ren, W. Lou, K. Zeng, and P. Moran, “On broadcast authentication in wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136–4144, 2007.
X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, “Defending DoS attacks on broadcast authentication in wireless sensor networks,” in Proc. 2008 IEEE ICC, pp. 1653–1657.
R. Gennaro and P. Rohatgi, “How to sign digital streams,” in Advances in Cryptology-CRYPTO, Lecture Notes in Computer Science, 1997, vol. 1294, pp. 180–197.
C. K. Wong and S. Lam, “Digital signatures for flows and multicasts,” IEEE/ACM Trans. Networking, vol. 7, no. 4, pp. 502–513, 1999.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.