7
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks

, &
Pages 201-223 | Published online: 14 Mar 2007

References

  • Carman , David W. , Kruus , Peter S. and Matt , Brian J. 2000 . Constraints and approaches for distributed sensor network security . NAI Labs Technical Report #00–010 , September
  • Chan , H. , Perrig , A. and Song , D. 2003 . Random key predistribution schemes for sensor networks . IEEE Symposium on Security and Privacy . May 11–14 2003 , Berkeley, California.
  • Du , Wenliang , Deng , Jing , Han , Yunghsiang S. , Chen , Shigang and Varshney , Pramod . . A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge . To appear in IEEE INFOCOM .
  • Eschenauer , L. and Gligor , V. D. . A key-management scheme for distributed sensor networks . Proceedings of the Ninth ACM Conference on Computer and Communications Security . Washington, DC, USA.
  • Amir , Y. , Ateniese , G. , Hasse , D. , Kim , Y. , Nita-Rotaru , C. , Schlossnagle , T. , Schultz , J. , Stanton , J. and Sudik , G. T. 2000 . Secure group communication in asynchronous networks with failures: Integration and experiments . ICDCS 2000 , Apr.
  • Intanagonwiwat , C. , Govindan , R. and Estrin , D. 2000 . Directed diffusion: A scalable and robust communication paradigm for sensor networks . Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking . Aug. 2000 , Boston, MA. pp. 56 – 67 . ACM Press .
  • Du , Wenliang , Deng , Jing , Han , Yunghsiang S. and Varshney , Pramod . 2003 . A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks . Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS) . October 27–31 2003 , Washington, DC.
  • Subramanian , Lakshminarayanan and Katz , Randy H. 2000 . An Architecture for Building Self-Configurable Systems . IEEE MobiHoc ,
  • Perrig , A. , Szewczyk , R. , Wen , V. , Culler , D. and Tygar , J. D. . SPINS: Security protocols for sensor networks . Proceedings of Mobicom .
  • Steiner , Michael , Tsudik , Gene and Waidner , Michael . 2000 . Key Agreement in Dynamic Peer Groups . IEEE Transactions on Parallel and Distributed Systems , 11 ( 8 ) : 769 – 780 .
  • Jiejun Kong , P. , Zerfos , Petros , Luo , Haiyun , Lu , Songwu and Zhang , Lixia . . Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks . International Conference on Network Protocols (ICNP) .
  • Kim , Y. , Perrig , A. and Tsudik , G. 2000 . Simple and fault-tolerant key agreement for dynamic collaborative groups . ACM CCS 2000 . November 2000 .
  • Shamir , A. 1979 . How to Share a Secret . Communications of the ACM , 22 ( 11 ) : 612 – 613 .
  • Diffie , Whitfield and Hellman , Martin E. 1979 . Privacy and authentication. An introduction to cryptography . Proceedings of the IEEE , 67 ( 3 ) March : 397 – 427 .
  • 15. William Stallings. Network Security Essentials Applications and Standards.
  • http://www.isi.edu/nsnam/ns/
  • Perkins , Charles E. and Royer , Elizabeth M. 1999 . Ad hoc On-Demand Distance Vector Routing . Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications . February 1999 , New Orleans, LA. pp. 90 – 100 .
  • Perkins , Charles . . Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers . ACM SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications .
  • http://pf.itd.nrl.navy.mil/projects.php?name=nrlsensorsim
  • http://www.xbow.com/Products/Wireless_Sensor_Networks.htm.
  • Zhu , Sencun , Setia , Sanjeev and Jajodia , Sushil . . LEAP: efficient security mechanisms for large-scale distributed sensor networks . Proceedings of the Tenth ACM Conference on Computer and Communication Security .
  • http://www.tinyos.net/
  • http://www.cens.ucla.edu/∼mmysore/Design (www.cens.ucla.edu/~mmysore/Design)

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.