MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks
暂无分享,去创建一个
[1] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[2] Rui Zhang,et al. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[3] Mani B. Srivastava,et al. High-resolution, low-power time synchronization an oxymoron no more , 2010, IPSN '10.
[4] Philippas Tsigas,et al. ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System , 2009, NordSec.
[5] Jianhua Ma,et al. Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime , 2010, J. Univers. Comput. Sci..
[6] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[7] Yufeng Wang,et al. Delay-Throughput Trade-Off with Opportunistic Relaying in Wireless Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[8] Chun Chen,et al. Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[9] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[10] Pin-Han Ho,et al. TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.
[11] Peng Ning,et al. TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.
[12] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[13] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[14] Chun-Shien Lu,et al. Noninteractive Pairwise Key Establishment for Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.
[15] Dhiren R. Patel,et al. FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks , 2012, ArXiv.
[16] Tarek F. Abdelzaher,et al. Design and Comparison of Lightweight Group Management Strategies in EnviroSuite , 2005, DCOSS.
[17] Saurabh Ganeriwal,et al. Timing-sync protocol for sensor networks , 2003, SenSys '03.
[18] C.-S. Lu,et al. Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.
[19] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[20] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[21] Dhiren R. Patel,et al. Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks , 2008, ICISS.
[22] Srdjan Capkun,et al. Secure Time Synchronization in Sensor Networks , 2008, TSEC.
[23] C.-S. Lu,et al. Constrained Function-Based Message Authentication for Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.
[24] Deborah Estrin,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Fine-grained Network Time Synchronization Using Reference Broadcasts , 2022 .
[25] Sam Blackshear,et al. R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks , 2010, SAC '10.
[26] Peng Ning,et al. Securing network access in wireless sensor networks , 2009, WiSec '09.
[27] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[28] P. C. Wang,et al. A New Access Control Method Using Prime Factorisation , 1992, Comput. J..
[29] M. McConnell. Information assurance in the twenty-first century , 2002 .