21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

242 Bibliography<br />

[204] S. Zhu, S. Xu, S. Setia, and S. Jajodia. Establish<strong>in</strong>g Pair-wise Keys<br />

<strong>for</strong> <strong>Secure</strong> <strong>Communication</strong> <strong>in</strong> Ad Hoc <strong>Networks</strong>: A Probabilistic Approach.<br />

Technical Report ISE-TR-03-01, George Mason University,<br />

March 2003.<br />

[205] Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. LEAP: Efficient Security<br />

Mechanisms <strong>for</strong> Large-Scale Distributed <strong>Sensor</strong> <strong>Networks</strong>. In Proceed<strong>in</strong>gs<br />

of the 10th ACM Conference on Computer and <strong>Communication</strong>s<br />

Security (CCS), pages 62–72. ACM Press, 2003.<br />

[206] Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng N<strong>in</strong>g. An Interleaved<br />

Hop-by-Hop Authentication Scheme <strong>for</strong> Filter<strong>in</strong>g False Data Injection<br />

<strong>in</strong> <strong>Sensor</strong> <strong>Networks</strong>. In IEEE Symposium on Security and Privacy.<br />

IEEE, 2004.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!