Cryptography Reference
In-Depth Information
path redundancy, Quality of Service (QoS) requirement, and network heterogeneity.
Subsequently, we looked at the applicability of ID-based cryptography in WSN and its
efficiency in preventing selective-forwarding attack. In conclusion, we briefly reviewed
the concept of cross-layer routing in WSN.
7. 6 R e f e r e n c e s
Al-Karaki, J. N., and A. E. Kamal. Routing techniques in wireless sensor networks: A survey.
Wireless Communications (IEEE) 11 (2004): 6-28.
Akyildiz, I. F., M. C. Vuran, and O. B. Akan. A cross-layer protocol for wireless sensor net-
works. Proceedings of Information Science and Systems. 2006.
Aranha, D., R. Dahab, J. López, and L. Oliveira. Efficient implementation of elliptic curve
cr yptography in wireless sensors. Advances in Mathematics of Communications 4, no. 2 (2010):
169 -187.
Boneh, D., and M. Franklin. Identity-based encryption from the Weil pairing. Lecture Notes in
Computer Science (Springer-Verlag) 2139 (2001): 213-229.
Banerjee, P., D. Jacobson, and S. N. Lahiri. Security and performance analysis of a secure
clustering protocol for sensor networks. Network Computing and Application (IEEE), 2007,
145 -152.
Chan, H., and A. Perrig. ACE: An emergent algorithm for highly uniform cluster formation.
Lecture Notes in Computer Science (Springer) 2920 (2004): 154-171.
Ganesan, D., R. Govindan, S. Shenker, and D. Estrin. Highly-resilient, energy-efficient multi-
path routing in wireless sensor networks. Mobile Computing and Communications Review
(ACM SIGMOBILE) 5, no. 4 (2001): 10-24.
Haas, Z., and M. Pearlman. The performance of query control scheme for the zone routing
protocol. Transactions on Networking (IEEE), 2001, 427-438.
Heinzelman, W., A. Chandrakasan, and H. Balakrishnan. An application specific protocol
architecture for wireless microsensor networks. Transactions on Wireless Communications
(IEEE) 1, no. 4 (2002): 660-670.
Johnson, D., and D. Maltz. Dynamic source routing. Mobile Computing (Kulwer Academic
Press), 1996, 153-181.
Khalili, A., J. Katz, and A. Arbaugh. Towards secure key distribution in truly ad-hoc network.
Symposium on Applications and the Internet Workshops. IEEE, 2003, 342-346.
Kuo-Feng, S., W. Wei-Tong, and C. Wen-Chung. Detecting Sybil attacks in wireless sensor net-
works using neighboring information. Computer Networks (Elsevier) 53, no. 18 (December
2009): 3042-3056.
Lindsey, S., and C. S. Raghavendra. PEGASIS: Power-efficient gathering in sensor information
systems. Proceedings of Aerospace Conference. IEEE, 2002, 1125-1130.
Lu, H., J. Li, and H. Kameda. A secure routing protocol for cluster-based wireless sensor net-
works using id-based digital signature. Global Telecommunications Conference. IEEE, 2010,
1-5.
Mallanda, C., S. Basavaraju, A. Kulshrestha, R. Kannan, A. Durresi, and S. S. Iyengar. Secure
cluster based energy aware routing for wireless sensor networks. Proceedings of International
Conference on Wireless Networks. CSREA, 2004, 461-466.
Maurer, U. M., and Y. Yacobi. A non-interactive public-key distribution system. Designs, Codes
and Cryptography (Kluwer) 9, no. 3 (1996): 305-316.
Search WWH ::




Custom Search