Achieving robust message authentication in sensor networks: a public-key based approach
暂无分享,去创建一个
[1] Ossama Younis,et al. Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach , 2004, IEEE INFOCOM 2004.
[2] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[3] Qun Li,et al. Distributed User Access Control in Sensor Networks , 2006, DCOSS.
[4] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[5] Bo Sheng,et al. Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[6] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[7] Stefano Basagni,et al. Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).
[8] Thomas F. La Porta,et al. Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2006, IEEE Transactions on Mobile Computing.
[9] Qun Li,et al. Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.
[10] Xiaojiang Du. Detection of Compromised Sensor Nodes in Heterogeneous Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[11] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[12] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[13] Donggang Liu,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.
[14] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[15] Pascal Lorenz,et al. Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part I , 2005, ICN.
[16] Yuguang Fang,et al. Securing sensor networks with location-based keys , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[17] Ravi Prakash,et al. Max-min d-cluster formation in wireless ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[18] Sajal K. Das,et al. WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.
[19] Edward J. Coyle,et al. An energy efficient hierarchical clustering algorithm for wireless sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] Adi Shamir,et al. How to share a secret , 1979, CACM.
[21] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.
[22] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[23] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[24] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[25] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[26] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[27] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[28] Douglas R. Stinson,et al. On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.
[29] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[30] Thomas F. La Porta,et al. Establishing Pair-Wise Keys in Heterogeneous Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[31] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[32] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[33] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[34] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[35] S. Khuller,et al. A Clustering Scheme for Hierarchical Control in Wireless Networks , 2001 .
[36] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[37] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[38] Weijia Li,et al. Locating Compromised Sensor Nodes Through Incremental Hashing Authentication , 2006, DCOSS.
[39] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[40] Yong Guan,et al. A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[41] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.