VEGK: SECURE CLUSTERING FOR EFFICIENT OPERATION IN WSNS

Ahmed E. El-Din Khaled, Rabie A. Ramadan, and Magda B. Fayek

References

  1. [1] D. Mascarenas, E. Flynn, C. Farrar, G. Park, and M. Todd, A mobile host approach for wireless powering and interrogation of structural health monitoring sensor networks, Sensors Journal IEEE, 9(12), 2009, 1719–1726.
  2. [2] S. Dezhen, Probabilistic modeling of LEACH protocol andcomputing sensor energy consumption rate in sensor networks(Texas A & M University, 2005).
  3. [3] H. Kour and A.K. Sharma, Hybrid energy efficient distributed protocol for heterogeneous wireless sensor network, International Journal of Computer Applications, 2010.
  4. [4] N. Kumar and J. Kaur, Improved LEACH protocol for wireless sensor networks, Wireless Communication, Networking and Mobile Computing, 2011.
  5. [5] C. Long, L. Li, and W. Wu, An improved scheme of SEP inheterogeneous wireless sensor networks, Computational Intelligence and Industrial Application PACIIA, December 2008.
  6. [6] G. Smaragdakis, I. Matta, and A. Bestavros, SEP: A stable election protocol for clustered heterogeneous wireless sensor networks, 2004.
  7. [7] A. Perrig, J. Stankovic, and D. Wagner, Security in wireless sensor networks, Communication of the ACM, 47, June 2004.
  8. [8] D. Liu and P. Ning, Security for wireless sensor networks – Advances in information security (Springer, 2011).
  9. [9] E. Cayirci and C. Rong, Security in wireless adhoc and sensor networks (Wiley, 2009).
  10. [10] C. Lederer, R. Mader, M. Koschuch, J. Großsch, A. Szekely, and S. Tillich, Energy-efficient implementation of ECDH key exchange for wireless sensor networks, IFIP International Federation for Information Processing, 2009.
  11. [11] S.A. Camtepe and B. Yener, Key distribution mechanisms for wireless sensor networks: A survey, March 23, 2005.
  12. [12] S. Vitabile, V. Conti, M. Collotta, G. Scat`a, S. Andolina, A. Gentile, and F. Sorbello, A real-time network architecture for biometric data delivery in ambient intelligent, Journal of Ambient Intelligence and Humanized Computing (AIHC), c Springer-Verlag Editor, 2012.
  13. [13] A.K. Pathan and C.S. Hong, SERP: Secure energy-efficientrouting protocol for densely deployed wireless sensor net-works, Annals of Telecommunications, DOI: 10.1007/s12243-008-0042-5, 63(9–10), October 2008, 529–541.
  14. [14] Reza, Arash, Zine, A key management scheme for cluster based wireless sensor networks, IEEE/IFIP Int. Conf. on Embedded and Ubiquitous Computing, 2008.
  15. [15] Z. Rui and H. Yang, A hybrid key management scheme forheterogeneous wireless sensor networks based on ECC andtrivariate symmetric polynomial, Int. Conf. on UncertaintyReasoning and Knowledge Engineering IEEE, 2011.
  16. [16] L.B. Oliveria, H.C. Wong, and A.A. Loureir, LHA-SP: Secure protocols for hierarchical wireless sensor networks, IEEE, 2005.
  17. [17] G. Smaragdakis, I. Matta, and A. Bestavros, SEP: A stable election protocol for clustered heterogeneous wireless sensor networks, 2004.
  18. [18] H. Wang and Q. Li, Efficient implementation of public key cryptosystems on mote sensors, Proc. of Int. Conf. on Information and Communication Security, 2006.
  19. [19] A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Chang-Shantz, Energy analysis of public-key cryptography on smallwireless devices, IEEE PerCom 2005, 2005, 324–328.
  20. [20] Z. Li and G. Gong, A survey on security in wireless sensor networks, Special English Edition of Journal of KIISC, 18(6(B)), 2008, 233–248.
  21. [21] T. Zhang and H. Qu, A lightweight key management scheme for wireless sensor networks (IEEE Computer Society, 2010).
  22. [22] N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, 48, 1987, 203–209.

Important Links:

Go Back