A Survey on Security in Wireless Sensor Networks
暂无分享,去创建一个
[1] P. Erdos,et al. On the evolution of random graphs , 1984 .
[2] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[3] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] J. Spencer. The Strange Logic of Random Graphs , 2001 .
[5] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[6] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[9] Sencun Zhu,et al. LEAP: efficient security mechanisms for large-scale distributed sensor networks , 2003, CCS '03.
[10] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[11] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[12] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[13] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[14] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[15] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[16] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[17] Sajal K. Das,et al. Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[18] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[19] Jiang Wu,et al. Product Construction of Key Distribution Schemes for Sensor Networks , 2004, Selected Areas in Cryptography.
[20] Bruno Dutertre,et al. Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .
[21] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[22] P. Ning,et al. Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks , 2004 .
[23] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[24] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[25] Mohamed Eltoweissy,et al. Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.
[26] Anish Mathuria,et al. Efficient Secure Aggregation in Sensor Networks , 2004, HiPC.
[27] Roberto Di Pietro,et al. Connectivity properties of secure wireless sensor networks , 2004, SASN '04.
[28] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[29] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[30] Sushil Jajodia,et al. Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[31] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[32] S. Manesis,et al. A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..
[33] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[34] Stephan Olariu,et al. Group key management scheme for large-scale sensor networks , 2005, Ad Hoc Networks.
[35] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[36] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[37] Peng Ning,et al. Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[38] Mohamed Eltoweissy,et al. Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.
[39] Guido Bertoni,et al. ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[40] Subhamoy Maitra,et al. A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design , 2005, International Journal of Information Security.
[41] Mihui Kim,et al. Denial-of-service (DoS) detection through practical entropy estimation on hierarchical sensor networks , 2006, 2006 8th International Conference Advanced Communication Technology.
[42] Alan F. Smeaton,et al. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..
[43] Jong-Wook Han,et al. Consideration of efficient nearest node discovering mechanisms for key infection , 2006, 2006 8th International Conference Advanced Communication Technology.
[44] Paola Inverardi,et al. Distributed IDSs for enhancing Security in Mobile Wireless Sensor Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[45] Yunghsiang Sam Han,et al. A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.
[46] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[47] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[48] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[49] Seung-Woo Seo,et al. WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks , 2006, ICUCT.
[50] Radha Poovendran,et al. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks , 2006, Advances in Information Security.
[51] Bao Li,et al. An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[52] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.
[53] Thomas F. La Porta,et al. Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2006, IEEE Transactions on Mobile Computing.
[54] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[55] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[56] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[57] Deep Medhi,et al. Modeling Pairwise Key Establishment for Random Key Predistribution in Large-Scale Sensor Networks , 2007, IEEE/ACM Transactions on Networking.
[58] Dong Seong Kim,et al. A Secure Data Aggregation Scheme for Wireless Sensor Networks , 2007, ISPA Workshops.
[59] Thomas F. La Porta,et al. SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[60] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[61] Wenjing Lou,et al. Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[62] Mahmut T. Kandemir,et al. On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[63] Sanjay Kumar Madria,et al. Sybil attack detection in a hierarchical sensor network , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[64] Seung-Woo Seo,et al. Optimized Hash Tree for Authentication in Sensor Networks , 2007, IEEE Communications Letters.
[65] Maryline Laurent-Maknavicius,et al. A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).
[66] Dong Hoon Lee,et al. Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[67] Qi Shi,et al. Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol , 2007, Third International Symposium on Information Assurance and Security.
[68] Weili Wu,et al. Wireless Sensor Networks and Applications , 2008 .
[69] Douglas R. Stinson,et al. On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.
[70] Ricardo Dahab,et al. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.
[71] Wensheng Zhang,et al. Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[72] Ricardo Dahab,et al. NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks , 2008, EWSN.
[73] Sukumar Nandi,et al. Defense against outside attacks in wireless sensor networks , 2008, Comput. Commun..
[74] Jiang Wu,et al. Minimum node degree and κ-connectivity for key predistribution schemes and distributed sensor networks , 2008, WiSec '08.
[75] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .