5
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Multicast Encryption Infrastructure for Security in Sensor Networks

, , &
Pages 139-157 | Published online: 09 Mar 2009

References

  • Akyildiz , I. F. , Su , W. , Sankarasubramaniam , Y. and Cayirci , E. 2002 . A survey on sensor networks . IEEE Communications , 40 ( 8 ) : 102 – 114 . Aug
  • Tubaishat , Malik and Madria , Sanjay . 2003 . Sensor Networks – An Overview . IEEE Potentials , 22 ( 2 ) : 20 – 23 . April/May
  • Carman , D. W. 2005 . “ Data security perspectives ” . In Distributed Sensor Networks , Edited by: Iyengar , S. S. and Brooks , R. R. Boca Raton, FLA : Chapman and Hall .
  • Chan , H. and Perrig , A. 2003 . “ Security and privacy in sensor networks ” . In IEEE Computer Magazine 103 – 105 .
  • Chan , H. , Perrig , A. and Song , D. 2003 . “ Random key predistribution schemes for sensor networks ” . In Proceedings of the 2003 IEEE Symposium on Security and Privacy 197 – 214 .
  • Carman , D. W. , Kraus , P. S. and Matt , B. J. 2000 . “ Constraints and approaches for distributed sensor network security (final) ” . In NAI Labs Technical Report #00–010 September 1
  • Eschenauer , L. and Gligor , V. D. 2002 . “ A key-management scheme for distributed sensor networks ” . In Proceedings of the 9th ACM Conference on Computer and Communications Security CCCS
  • Liu , D and Ning , P . 2003 . “ Establishing pairwise keys in distributed sensor networks ” . In Proceedings of the 10th ACM Conference of Computer and Communication Security CCCS
  • Iyengar , S. S. and Brooks , R. R. , eds. 2005 . Distributed Sensor Networks , Boca Raton, FL : Chapman and Hall .
  • Poovendran , R. and Baras , J. S. 1999 . An information theoretic analysis of rooted-tree based secure multicast key distribution schemes . Lecture Notes in Computer Science , 1666 : 624 – 638 . August
  • Dahlman , S. 2001 . Key management schemes in multicast environments , Pro gradu Thesis, Computer Science Dept, University of Tampere .
  • Zhu , S. , Setia , S. and Jajodia , S. 2002 . “ Performance Optimizations for Group Key Management Schemes for Secure Multicast ” . In Technical Report, George Mason University
  • Menezes , A. J. , van Oorschot , P. C. and Vanstone , A. A. 1996 . Handbook of Applied Cryptography , Boca Raton, FL : CRC Press .
  • Pillai , B. 2006 . “ Network ” . In Embedded Support for Sensor Network Security , Masters Thesis, ECE Dept, Clemson University, May .
  • Brooks , R. R. , Pillai , B. , Rai , S. and Racunas , S. 2005 . “ Mobile Network Analysis Using Probabilistic Connectivity Matrices ” . In IEEE Transactions on Systems Man and Cybernetics, Part C , Accepted for Publication . Nov
  • Pirretti , M. , Vijaykrishnan , N. , Kandemir , M. and Brooks , R. R. October 2005 . “ Realistic Models for Sensor Networks Using Key Predistribution Schemes ” . In Innovations and Commercial Applications of Distributed Sensor Networks Symposium October , Bethesda, MD
  • Baase , Sara . 1988 . Computer Algorithms – Introduction to Analysis and Design , New York : Addison Wesley .
  • Brooks , R. R. , Govindaraju , P. Y. , Pirretti , M. , Vijaykrishnan , N. and Kandemir , M. “ On the Detection of Clones in Sensor Networks Using Random Key Predistribution ” . In Submitted for review
  • Barborak , M. , Malek , M. and Dahbura , A. 1993 . The Consensus Problem in Fault-Tolerant Computing . ACM Computing Surveys , vol 25 ( 2 ) : 171 – 220 . June
  • Brooks , R. R. and Iyengar , S. S. 1998 . Multi-Sensor Fusion: Fundamentals and Applications with Software , Upper Saddle River, NJ : Prentice Hall PTR .
  • Brooks , R. R. , Friedlander , D. , Koch , J. and Phoha , S. 2004 . Tracking Multiple Targets with Self-Organizing Distributed Ground Sensors . Journal of Parallel and Distributed Computing Special Issue on Sensor Networks , 64 ( 7 ) : 874 – 884 . August
  • Doucear , John R. 2002 . “ The Sybil attack ” . In In Proc. of the IPTPS02 Workshop Cambridge, MA (USA) March
  • Harney , H. and Muchenhirn , C. 1997 . “ Group Key Management Protocol (GKMP) Specification ” . In RFC 2093 July
  • Hardjono , T. , Patel , B. and Shah , M. 2000 . “ Intra-domain group key management protocol.” . In IETF Internet draft September

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.