

Cryptography Based Message Authentication for Wireless Sensor Network
Abstract
Keywords
References
J. Deng, R. Han, S. Mishra. Defending against Path-based DoS Attacks in Wireless Sensor Networks. In ACM SASN, 2005.
D. Liu, P. Ning, ―Establishing Pairwise Keys in Distributed Sensor Networks,‖ ACM CCS, 2003.
D. Liu and P. Ning, ―Multi-Level μTESLA: Broadcast Authentication for Distributed Sensor Networks,‖ ACM Transactions in Embedded Computing Systems (TECS), Vol. 3, No. 4, pages 800-836, November 2004.
D. J. Malan, M. Walsh, and M. D. Smith, ―Implementaing Public-Key Infrastructure for Sensor Networks,‖ ACM Trans. on Sensor Networks, 2008.
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and Doug Tygar, ―SPINS: Security Protocols for Sensor Networks,‖ ACM MobiCom, 2001.
K. Ren, W. Lou, and Y. Zhang, ―LEDS: providing location-aware end-toend data security in wireless sensor networks,‖ IEEE INFOCOM, 2006.
C. M. Yu, T. Y. Chi, C. S. Lu, and S. Y. Kuo, ―A Constrained Random Perturbation Vector-Based Pairwise Key Establishment Scheme for Wireless Sensor Networks,‖ ACM MobiHoc, 2008.
F. Ye, H. Luo, S. Lu, and L. Zhang, ―Statistical En-route Filtering of Injected False Data in Sensor Networks,‖ IEEE INFOCOM, 2004.
H. Yang, F. Ye, Y. Yuam, S. Lu, and W. Arbaugh, ―Toward Resilient Security in Wireless Sensor Networks,‖ ACM MobiHoc, 2005.
S. Zhu, S.Setia, and S.Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In ACM CCS, 2003.
S. Zhu, S. Setia, S. Jajodia, and P. Ning, ―An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks,‖ IEEE S&P, 2004.
W. Zhang, N. Subramanian, and G. Wang, ―Lightweight and Compromise-Resilient Message Authentication in Sensor Networks,‖
Anoop MS Tata Elxsi Ltd, India ―public key cryptography‖
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, ―Non-interactive pairwise key establishment for sensor networks,‖ IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 556–569, Sep. 2010.
C.-M. Yu, C.-S. Lu, and S.-Y Kuo, ―A constrained function based authentication scheme for sensor networks,‖ in Proc. IEEEWireless Communications & Networking Conf. (WCNC), Budapest, Hungary, 2009.
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, ―A DoS-resilient en-route filtering scheme for sensor networks,‖ in Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), New Orleans, LA, 2009, (poster).
F. Ye, H. Luo, S. Lu, and L. Zhang, ―Statistical en-route filtering of injected false data in sensor networks,‖ in Proc. IEEE Conf. Computer Communications (INFOCOM), Hong Kong, China, 2004.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.