|
[Auma09] J.P. Aumasson, W. Meier, and F. Mendel, “Preimage attacks on 3-Pass HAVAL and step-reduced MD5,” The 15th Workshop on Selected Areas in Cryptography, LNCS 2453, pp. 120-135, 2009. [Bech13]W. Bechkit, Y. Challal, and A. Bouabdallah, “A new class of hash-chain based key pre-distribution scheme for WSN,” Computer Communications, vol. 36, pp. 243-255, Jan., 2013. [Cabr17]J. Cabra, D. Castro, J. Colorado, D. Mendez and L. Trujillo, “An IoT approach for wireless sensor networks applied to e-Health environmental monitoring,” IEEE International Conference on Internet of Things, pp. 578-583, 2017. [Chan03]H. Chan, A. Perrig, and D. Song, “Random key redistribution schemes for sensor networks,” IEEE Symp. Security Privacy, May 2003, pp. 197-213. [Chen17]Y.R. Chen and W.G. Tzeng, “Group key management with efficient rekey mechanism: a semi-stateful approach for out-of-synchronized members,” Computer Communications, vol. 98, pp. 31-42, Jan., 2017. [Dini15]G. Dini and L. Lopriore, “Distributed storage protection in wireless sensor networks,” Journal of Systems Architecture, vol. 61, pp. 256-266, 2015. [Esch02]L. Eschenauer and V.D. Gligor, “A key-management scheme for distributed sensor networks,” The 9th ACM conference on Computer and communications security, pp. 41-47, 2002. [Ehda16]Ehdaiea et al., “2D hash chain robust random key distribution scheme,” Information Processing Letters, vol. 16, pp. 367-372, 2016. [Gu05]L. Gu et al., “Lightweight detection and classification for wireless sensor networks in realistic environments,” Proc. 3rd ACM Confs,” The 3rd ACM Conf. Embedded Netw. Sensor Syst., pp. 205-217, 2005. [Gao06]T. Gao, D. Greenspan, M. Welsh, R. Juang, and A. Alm, “Vital signs monitoring and patient tracking over a wireless network,” The 27th Annu. Int. Conf. Eng. Med. Biol. Soc., pp. 102-105, 2006. [Gand17]F. Gandino, R. Ferrero, and M. Rebaudengo, “A key distribution scheme for mobile wireless sensor networks: q-s-Composite,” IEEE Transactions on Information Forensics and Security, vol. 12, pp. 34-47, 2017. [Harn15]L. Harn and C.F. Hsu, “Predistribution scheme for establishing group keys in wireless sensor networks,” IEEE Sensors Journal, vol.15, pp. 5103-5108, 2015 [Hu05]Y.C. Hu, M. Jakobsson, and A. Perrig, “Efficient constructions for one-way hash chains,” The 3rd international conf. on Applied Cryptography and Network Security, LNCS 3531, pp. 423-441, 2005. [Hern19]N.J. Hernandez Marcano, J.H. Lauritsen, K.K. Jacobsen and R.H. Jacobsen, “Enabling secure multicast group communications in IP wireless networks for the Internet of Things,” The 25th European Wireless Conference, pp. 1-7, 2019. [Li13]F. Li and P. Xiong, “Practical secure communication for integrating wireless sensor networks into the Internet of Things,” IEEE Sensors J., vol. 13, pp. 3677-3684, 2013. [Levi17]A. Levi and S. Sarimurt, “Utilizing hash graphs for key distribution for mobile and replaceable interconnected sensors in the IoT context," Ad Hoc Networks, vol. 57, pp. 3-18, 2017. [Mehm17]A. Mehmood, M. M. Umar, and H. Song, “ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks,” Ad Hoc Networks, vol. 55, pp. 97-106, Feb., 2017. [Nadi16]I. Nadir, W. K. Zegeye, F. Moazzami and Y. Astatke, “Establishing symmetric pairwise-keys using public-key cryptography in Wireless Sensor Networks (WSN),” IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, pp. 1-6, 2016. [Rash11]A. Rasheed and R. N. Mahapatra, “Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 22, pp. 176-184, 2011. [Yavu15]F. Yavuz, J. Zhao, O. Yağan, and V. Gligor, “Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme,” IEEE International Conference on Communications, pp. 6277-6283, 2015. [Yang17]C.N. Yang, J.M. Li, and Y.S. Chou, “On the analysis of k-Secure t-conference key distribution scheme,” ICCNS 2017 Proceedings of the 2017 the 7th International Conference on Communication and Network Security, pp. 91-95, ACM Proc. ISBN 978-1-4503-5349-6, Tokyo, Japan, Nov., 2017. [Zemr19]H. Zemrane, Y. Baddi, and A. Hasbi, “Ehealth smart application of WSN on WWAN,” The 2nd International Conference on Networking, Information Systems & Security, 2019. [Zhao14]J. Zhao, O. Yağan and V. Gligor, “On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on/off channels,” IEEE International Symposium on Information Theory, pp. 1131-1135, 2014. [Zhao17]J. Zhao, “Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links,” IEEE/ACM Transactions on Networking, vol. 25, pp. 1789-1802, 2017.
|