LoENA: Low-overhead encryption based node authentication in WSN
暂无分享,去创建一个
[1] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[2] Sajal K. Das,et al. Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .
[3] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[4] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..
[5] Christian Callegari,et al. Advances in Computing, Communications and Informatics (ICACCI) , 2015 .
[6] Xiaohua Li,et al. An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[7] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[8] Xuehai Zhou,et al. Distributed Node Authentication in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[9] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[10] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[11] Sipra Das Bit,et al. A dynamic TDMA based scheme for securing query processing in WSN , 2012, Wirel. Networks.
[12] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[13] Sipra Das Bit,et al. μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks , 2012, DPM/SETOP.
[14] Liangmin Wang,et al. Mobile node authentication protocol for crossing cluster in heterogeneous wireless sensor network , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[15] Yu-Jung Huang,et al. Mutual Message Authentication Protocol in Wireless Sensor Networks , 2022 .
[16] A. V. Sakhare,et al. Efficient Sensor Node Authentication in Wireless Integrated Sensor Networks Using Virtual Certificate Authority , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[17] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[18] Harsh K. Verma,et al. Authentication Protocol for Wireless Sensor Networks , 2010 .