Security for wireless sensor network
暂无分享,去创建一个
M. A. Mokhtar | M. R. M. Rizk | Sanaa S. Abd El dayem | M. A. Mokhtar | Sanaa S. Abd El Dayem | M. Rizk
[1] Joonsang Baek,et al. Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.
[2] Wendi Heinzelman,et al. Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .
[3] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[4] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[5] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[6] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Mohammad Ilyas,et al. Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.
[9] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[10] Ashok Kumar Das. A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge , 2011, ArXiv.
[11] Leandros Tassiulas,et al. Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing , 2013, ACM Interational Symposium on Mobile Ad Hoc Networking and Computing.
[12] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[13] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[14] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[15] Imad Mahgoub,et al. A Hierarchical Key Establishment Scheme forWireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).
[16] Jon Crowcroft,et al. Ticket based service access for the mobile user , 1997, MobiCom '97.
[17] Armando Fox,et al. Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.
[18] K.S. Ramanatha,et al. An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.
[19] S.A. Khan,et al. Analyzing & Enhancing energy Efficient Communication Protocol for Wireless Micro-sensor Networks , 2005, 2005 International Conference on Information and Communication Technologies.