參考文獻 |
[1] L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM conference on Computer and Communication Security, pages 41- 47, November 2002.
[2] H. Chan, A. Perrig and D. Song, “Random key pre-distribution schemes for sensor networks,” in Proceedings of IEEE Symposium on Security and Privacy, pages 197–213, May 2003.
[3] W. Du, J. Deng, Y. S. Han and P. K. Varshney, “A pair-wise key pre-distribution scheme for wireless sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), pages 42–51, October 2003.
[4] D. Liu and P. Ning, “Establishing pair-wise key establishments for static sensor networks,“ in Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), pages 52-61, October 2003.
[5] W. Du, J. Deng, Y. S. Han, S. Chen and P. K. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in Proceedings of IEEE INFOCOM, March 2004.
[6] D. Liu and P. Ning, ” Location based pair-wise key establishments for static sensor networks,” in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (CCS’03), pages 72-82, 2003.
[7] D. Huang, M. Mehta, D. Medhi and H. Lein, ”Location aware key management scheme for wireless sensor networks,” in Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), pages 29-42, October 2004.
[8] Y. Zhou, Y. Zhang and Y. Fang, ”LLK: A link layer key establishment scheme in wireless sensor networks,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), pages 29-42, March 2005.
[9] Z. Yu and Y. Guan, ”A robust group-based key management scheme for wireless sensor networks,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), 2005.
[10] H. Chan and A. Perrig, ”PIKE: Peer intermediaries for key establishment in sensor network,” in Proceedings of IEEE INFOCOM, March 2005.
[11] S. Zhu, S. Xu, S. Setia, and S. Jajodia, ”Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach,” in Proceedings of 11th IEEE International Conference on Network Protocols (ICNP), November 2003.
[12] H. Ling and T. Znati, “End-to-end pair-wise key establishment using multi-path in wireless sensor network,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2005.
[13] G. Li, H. Ling and T. Znati, ”Path key establishment using multiple secured paths in wireless sensor networks,” in Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology (CoNEXT'05), pages 43–49, 2005.
[14] L. Zhou, J. Ni and C. V. Ravishankar, ”Efficient key establishment for group-based wireless sensor deployments,” in Proceedings of the 4th ACM Workshop on Wireless security (WiSe), pages 1-10, September 2,2005
[15] A. Shamir, “How to share a secret,” in Proceedings of Communications of the ACM, Vol. 22, pages 612-613, November 1979.
[16] T. C. Wu, T. S. Wu, ”Cheating detection and cheater identification in secret sharing schemes,” in Proceedings of IEE Transaction on Computers and Digital Techniques, Vol. 142, pages 367-369, September 1995.
[17] K. Balakrishnan, J. Deng and P. K. Varshney, “TWOACK: Preventing selfishness in mobile ad hoc networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Vol. 4, pages 2137-2142, 2005.
[18] X. Li, L. Cuthbert, ”Node-disjointness based multi-path routing for mobile ad hoc networks,” in Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (PE-WASUN), October 2004.
[19] A. Wacker, M Knoll, T. Heiber and K. Rothermel, “A new approach for establishing pair-wise keys for securing wireless sensor networks,” in
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, pages 27 – 38, November 2005.
[20] R. L. Rivest, A. Shamir and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” in Proceedings of Communications of the ACM, pages 120-126, 1987.
[21] F. Ye, H. Luo, S. Lu, L. Zhang, ”Statistical en-route filtering of injected false data in sensor networks,” in Proceedings of the IEEE INFOCOM, pages 2446-2447, March 2004.
[22] D. Huang, D. Medhi, ”A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks,” in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium(IPDPS’05), April 2005.
[23] W. Diffie and M. E. Hellman, “New directions in cryptography,” in Proceedings of IEEE Transactions on Information Theory, Vol. 22, pages 644-654, November 1976.
[24] L. Lamport., “Password authentication with insecure communication,” in Proceedings of Communications of the ACM, pages 770-772, November 1981.
[25] M. Bellare, R. Canetti, and H. Krawczyk, ”Keying hash functions for message authentication” in Proceedings of Advances in Cryptology- Crypto ’96, pages 1-15, Vol. 1109, 1996. |