Author:
Yang Jie,Chen Yingying,Trappe Wade,Cheng Jerry
Publisher
Springer International Publishing
Reference19 articles.
1. B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Secure and efficient key management in mobile ad hoc networks,” in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2005.
2. A. Wool, “Lightweight key management for ieee 802.11 wireless lans with key refresh and host revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677–686, 2005.
3. M. bohge and W. Trappe, “An authentication framework for hierarchical ad hoc sensor networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), 2003, pp. 79–87.
4. T. Aura, “Cryptographically generated addresses (cga),” RFC 3972, IETF, 2005.
5. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, “Fingerprints in the ether: using the physical layer for wireless authentication,” in Proceedings of the IEEE International Conference on Communications (ICC), June 2007, pp. 4646–4651.