[1]Akyildiz IF, Su W, Sankarasubramaniam Y, et al. A Survey on Sensor Networks[J]. IEEE Communications Magazine, 2002,40(8): 102-114.
[2]Gura N, Patel A, Wander A, et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs[C]//CHES. Boston: Computer Science, 2004: 119-132.
[3]Malan D J, Welsh M, Smith M D. A Public-key Infrastructure for Key Distribution in TinyOS Based on Eiliptic Curve Cryptography[C]//First IEEE International Conference on Sensor and Ad Hoc Communications and Network. Santa Clara: IEEE, 2004: 71-80.
[4]Watro R, Kong D, Fen C S, et al. TinyPK: Securing Sensor Networks with Public Key Technology[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. Washington: ACM Press, 2004: 59-64.
[5]Benenson Z, Gedicke N, Raivio O. Realizing Robust User Authentication in Sensor Networks[C]//Workshop on Real-World Wireless Sensor Networks (REALWSN). Stockholm: Computer Science, 2005: 38-42.
[6]Gupta V, Millard M, Fung S, et al. Sizzle: a Standards-based End-to-end Security Architecture for the Embedded Internet[C]//Third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005). Kauai: IEEE, 2005: 425-445.
[7]Wang H, Sheng B, Li. Elliptic Curve Cryptography-based Access Control in Sensor Networks[J]. Int J Security and Networks, 2006, 1(3): 127-137.
[8]Benenson Z, Grtner F C, Kesdogan D. User Authentication in Sensor Networks (Extended Abstract)[C]//Informatik 2004, Workshop on Sensor Networks. Zurich: Computer Science, 2004: 87-91.
[9]Benenson Z, Grtner F C, Kesdogan D. An Algorithmic Framework for Robust Access Control in Wireless Sensor Networks[C]//Second European Workshop on Wireless Sensor Networks (EWSN). Germary: Computer Science, 2005: 158-165.
[10]Benenson Z, Freiling F C, Hammerschmidt E, et al. Authenticated Query Flooding in Sensor Networks[C]//21st IFIP International Information Security Conference SEC 2006. Karlstad: Karlstad University, 2006: 38-49.
[11]Blundo C, De Santis A, Herzberg A, et al. Perfectly-secure Key Distribution for Dynamic Conferences[C]//Advances in Cryptology CRYPTO 92: LNCS 740. Berlin: Springer-Verlag, 1993: 471-486.
[12]Banerjee S, Mukhopadhyay D. S Symmetric Key Based Authenticated Querying in Wireless Sensor Networks[C]//InterSense'06, Proceedings of the First International Conference on Integrated Internet Ad hoc and Sensor Networks. NIce: ACM, 2006, 22-25.
[13]Zhang Wensheng, Song Hui, Zhu Sencun, et al. Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks[C]//MobiHoc'05. Illinois: ACM, 2005: 378-389. |