Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks
暂无分享,去创建一个
[1] Dirk Westhoff,et al. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[2] Ivan Stojmenovic,et al. Handbook of Sensor Networks: Algorithms and Architectures , 2005, Handbook of Sensor Networks.
[3] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[4] M. Horton. MICA: The Commercialization of Microsensor Motes , 2002 .
[5] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[6] Dawn Song,et al. SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..
[7] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[8] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[9] Adrian Perrig,et al. Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes , 2007, SenSys '07.
[10] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[11] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[12] Deborah Estrin,et al. Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[13] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[14] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[15] Ivan Stojmenovic. Wiley Series on Parallel and Distributed Computing , 2005 .
[16] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[17] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[18] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[19] Naixue Xiong,et al. Secure Data Aggregation in Wireless Sensor Networks: A Survey , 2006, 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06).