Unmanned Vehicle Based Security System for Wireless Sensor Networks

[1]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[2]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[3]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[4]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[5]  Krishna M. Sivalingam,et al.  Wireless sensor networks - [Book Review] , 2005 .

[6]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[7]  Marco Gruteser,et al.  USENIX Association , 1992 .

[8]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[9]  Philip Levis,et al.  The nesC language: a holistic approach to networked embedded systems , 2003, SIGP.

[10]  Marco Gruteser,et al.  Privacy-Aware Location Sensor Networks , 2003, HotOS.

[11]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[12]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[13]  Zack J. Butler,et al.  Tracking a moving object with a binary sensor network , 2003, SenSys '03.

[14]  Pekka Nikander,et al.  DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.

[15]  Ertan Onur,et al.  WIRELESS SENSOR NETWORKS FOR SECURITY: ISSUES AND CHALLENGES , 2006 .

[16]  Bruno Sinopoli,et al.  Distributed control applications within sensor networks , 2003, Proc. IEEE.

[17]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[18]  Tufan C Karalar,et al.  Implementation of a Localization System for Sensor Networks , 2006 .

[19]  Radha Poovendran,et al.  SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.

[20]  Jiafu Wan,et al.  A General Test Platform for Cyber-Physical Systems: Unmanned Vehicle with Wireless Sensor Network Navigation , 2011 .

[21]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[22]  Mohammad Reza Zahabi,et al.  Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes , 2015 .

[23]  Arun Madhu,et al.  Wireless Sensor Network Security in Military Application using Unmanned Vehicle , 2015 .

[24]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[25]  Yuguang Fang,et al.  Securing resource-constrained wireless ad hoc networks , 2007 .

[26]  Brian D. O. Anderson,et al.  Wireless sensor network localization techniques , 2007, Comput. Networks.

[27]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[28]  E. Lewis,et al.  Wireless Sensor Node hardware: A review , 2008, 2008 IEEE Sensors.

[29]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[30]  Choong Seon Hong,et al.  Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[31]  Paolo Santi Topology control in wireless ad hoc and sensor networks , 2005 .

[32]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[33]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[34]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[35]  M. Melamed Detection , 2021, SETI: Astronomy as a Contact Sport.

[36]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[37]  Mohammad Saiful Islam Mamun,et al.  Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network , 2010, ArXiv.

[38]  Calvin Ko,et al.  Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[39]  P. Varaiya,et al.  Signal processing of sensor node data for vehicle detection , 2004, Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749).

[40]  Hsiao-Hwa Chen,et al.  Reduced Complexity Intrusion Detection in Sensor Networks Using Genetic Algorithm , 2009, 2009 IEEE International Conference on Communications.

[41]  Erdal Cayirci,et al.  Security in Wireless Ad Hoc and Sensor Networks , 2009 .

[42]  Sam Blackshear,et al.  R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks , 2010, SAC '10.

[43]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[44]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[45]  Dragos Niculescu Communication paradigms for sensor networks , 2005, IEEE Communications Magazine.

[46]  Antonio Barrientos,et al.  An Air-Ground Wireless Sensor Network for Crop Monitoring , 2011, Sensors.

[47]  Mohammed Feham,et al.  Novel hybrid intrusion detection system for clustered wireless sensor network , 2011, ArXiv.

[48]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[49]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[50]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[51]  J. Lynch Overview of Wireless Sensors for Real-Time Health Monitoring of Civil Structures , 2004 .

[52]  Robert E. Shannon,et al.  Introduction to the art and science of simulation , 1998, 1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).