Security Challenges for Energy-harvesting Wireless Sensor Networks
暂无分享,去创建一个
[1] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[2] Purushottam Kulkarni,et al. Energy Harvesting Sensor Nodes: Survey and Implications , 2011, IEEE Communications Surveys & Tutorials.
[3] Felix C. Freiling,et al. Vulnerabilities and Attacks in Wireless Sensor Networks , 2008 .
[4] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[5] Alberto Ferrante,et al. QoS and security in energy-harvesting wireless sensor networks , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[6] Larry Carter,et al. Universal classes of hash functions (Extended Abstract) , 1977, STOC '77.
[7] JooSeok Song,et al. Information Security and Cryptology - ICISC’99 , 1999, Lecture Notes in Computer Science.
[8] Dongho Won,et al. Information Security and Cryptology — ICISC 2000 , 2001, Lecture Notes in Computer Science.
[9] Qing Wu,et al. Accurate modeling and prediction of energy availability in energy harvesting real-time embedded systems , 2010, International Conference on Green Computing.
[10] Teodor-Grigore Lupu,et al. Main types of attacks in wireless sensor networks , 2009 .
[11] Ignas G. Niemegeers,et al. Providing security in energy harvesting sensor networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[12] Hervé Guyennet,et al. Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.