Cryptography in Wireless Sensor Networks for Security
Abstract
Full Text:
PDFReferences
K. Akkaya and M. Younis, “A Survey on routing protocols for wireless sensor networks, Ad Hoc networks”, 3(2005), pp 325-349.
Gustavo S. Quirino, Admilson R. L. Riberio and Edward David Moreno “Asymmetrical Encryption in wireless sensor networks”, 8(2012), http;//dx.doi.org/ 10.5772/48464.
E. Shi and A. Perrig, “Designing secure sensor networks”. Wireless communication magazine, 11 (6): pp 37-43, 2004.
Y. Wang, G. Attebeery, and B. Ramamurthy, “A Survey of security issues in wireless sensor networks”, IEEE communication surveys and tutorials, 8(2): pp 2-23, 2006.
Y. Wang, W. Gee, S. Chellappan, Dong Xuan, and Ten H. Laii, “Search-based physical attacks in sensor networks: Modeling and Defense, technical report, department of computer science and engineering, Ohio state university, 2005.
Shish Ahmad, Mohamad Rizwan beg, and Qamar Abbas, “ Energy saving secure framework for sensor network using elliptical curve cryptography Mobile Adhoc networks”, pp 167-172, 2012.
R. Ahlswede and I. Csiszar, “Common randomness in information theory and cryptography I. secret sharing” , vol. 39, no.4, pp 1121-1132, July.1993.
D. Han Kerson, A. Meneres, S. Vanstone, “Guide to Elliptical curve cryptography”, Springer- Verlag New York, Inc. 2004.
A. J. Menezes, P.C. Van oorschot, S.A. Vanstone, “Handbook of applied cryptography”, 1997.
G. Gaubtaz, J. P. Kaps, and B. Sunar, “Public key cryptography in sensor networks- revisited”, pp 1-17, 2004.
A. S. Wander, N. Gura, H. Eberle, V. Gupta and S.C. Shantz, “Energy analysis of public key cryptography for wireless sensor network”, pp 324-328, 2005.
Zhang Yu, “The Scheme of public key infrastructure for improving wireless sensor networks security”, pp 167-172, 2003.
W. Du, J. Deny, Y. S. Han, Shigang Chen, P. K. Varshney, “A key management scheme for wireless sensor network using deployment knowledge”, 2004.
O. Gungor, F. Chen, C. E. Koksal, “Secrete key generation via localization and mobility”, vol. 6, no. 6, pp 2214-2230, Jun. 2015.
H. Liu, J. Yang, Y. Wang, Y. Chen and C. E. Koksal, “Group key generation”, vol. 13, no. 12, pp 2820-2835, Dec 2014.
DOI: https://doi.org/10.37628/ijtet.v2i2.377
Refbacks
- There are currently no refbacks.