Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Constraint chaining: on energy-efficient continuous monitoring in sensor networks
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
An Efficient Elliptic Curves Scalar Multiplication for Wireless Network
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
Suppression and failures in sensor networks: a Bayesian approach
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
Extension of pairwise broadcast clock synchronization for multicluster sensor networks
EURASIP Journal on Advances in Signal Processing
IITA '08 Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 02
Design, implementation, and evaluation of EnviroMic: A storage-centric audio sensor network
ACM Transactions on Sensor Networks (TOSN)
Modeling of Military Networks Using Group Mobility Models
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
Strategies for data dissemination to mobile sinks in wireless sensor networks
IEEE Wireless Communications
Hi-index | 0.00 |
In Observing and interacting with the real physical world sensor networks now take new opportunities for play the roles in almost everywhere. They are composed of a large number of sensor nodes and each sensor node has capabilities of sensing, processing, and communication, which underpinned by limited energy. Reducing energy consumption was, is and will be a major concern in sensor networks. For the given extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary attack becomes a serious security threat toward wireless sensor networks. In this paper a secure public-key based effective and efficient sensor network is to be introduced. A saving time, reducing computing energy, algorithm is carefully investigated. The powerful elliptic curve cryptography (ECC) over GF (2m) is also investigated with hidden generator point.