The Sybil attack in sensor networks: analysis & defenses
暂无分享,去创建一个
A. Perrig | J. Newsome | E. Shi | D. Song | E. Shi | D. Song | A. Perrig | J. Newsome | D. Song
[1] Rolf Blom,et al. Non-Public Key Distribution , 1982, CRYPTO.
[2] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[3] Nitin H. Vaidya,et al. Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.
[4] Ivan Stojmenovic,et al. Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.
[5] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[6] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[7] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[8] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[9] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[10] Deborah Estrin,et al. GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.
[11] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[12] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[13] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[14] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[15] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[16] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[17] Milind Tambe,et al. Distributed Sensor Networks , 2003, Multiagent Systems, Artificial Societies, and Simulated Organizations.
[18] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[19] S. Sitharama Iyengar,et al. Distributed Sensor Networks , 2004 .
[20] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.