Unmanned Vehicle Based Security System for Wireless Sensor Networks
暂无分享,去创建一个
[1] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[2] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[3] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[4] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[5] Krishna M. Sivalingam,et al. Wireless sensor networks - [Book Review] , 2005 .
[6] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[7] Marco Gruteser,et al. USENIX Association , 1992 .
[8] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[9] Philip Levis,et al. The nesC language: a holistic approach to networked embedded systems , 2003, SIGP.
[10] Marco Gruteser,et al. Privacy-Aware Location Sensor Networks , 2003, HotOS.
[11] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[12] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[13] Zack J. Butler,et al. Tracking a moving object with a binary sensor network , 2003, SenSys '03.
[14] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[15] Ertan Onur,et al. WIRELESS SENSOR NETWORKS FOR SECURITY: ISSUES AND CHALLENGES , 2006 .
[16] Bruno Sinopoli,et al. Distributed control applications within sensor networks , 2003, Proc. IEEE.
[17] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[18] Tufan C Karalar,et al. Implementation of a Localization System for Sensor Networks , 2006 .
[19] Radha Poovendran,et al. SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.
[20] Jiafu Wan,et al. A General Test Platform for Cyber-Physical Systems: Unmanned Vehicle with Wireless Sensor Network Navigation , 2011 .
[21] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[22] Mohammad Reza Zahabi,et al. Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes , 2015 .
[23] Arun Madhu,et al. Wireless Sensor Network Security in Military Application using Unmanned Vehicle , 2015 .
[24] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[25] Yuguang Fang,et al. Securing resource-constrained wireless ad hoc networks , 2007 .
[26] Brian D. O. Anderson,et al. Wireless sensor network localization techniques , 2007, Comput. Networks.
[27] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[28] E. Lewis,et al. Wireless Sensor Node hardware: A review , 2008, 2008 IEEE Sensors.
[29] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[30] Choong Seon Hong,et al. Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[31] Paolo Santi. Topology control in wireless ad hoc and sensor networks , 2005 .
[32] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[33] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[34] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..
[35] M. Melamed. Detection , 2021, SETI: Astronomy as a Contact Sport.
[36] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[37] Mohammad Saiful Islam Mamun,et al. Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network , 2010, ArXiv.
[38] Calvin Ko,et al. Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[39] P. Varaiya,et al. Signal processing of sensor node data for vehicle detection , 2004, Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749).
[40] Hsiao-Hwa Chen,et al. Reduced Complexity Intrusion Detection in Sensor Networks Using Genetic Algorithm , 2009, 2009 IEEE International Conference on Communications.
[41] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[42] Sam Blackshear,et al. R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks , 2010, SAC '10.
[43] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[44] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[45] Dragos Niculescu. Communication paradigms for sensor networks , 2005, IEEE Communications Magazine.
[46] Antonio Barrientos,et al. An Air-Ground Wireless Sensor Network for Crop Monitoring , 2011, Sensors.
[47] Mohammed Feham,et al. Novel hybrid intrusion detection system for clustered wireless sensor network , 2011, ArXiv.
[48] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[49] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[50] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[51] J. Lynch. Overview of Wireless Sensors for Real-Time Health Monitoring of Civil Structures , 2004 .
[52] Robert E. Shannon,et al. Introduction to the art and science of simulation , 1998, 1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).