Of Malicious Motes and Suspicious Sensors
暂无分享,去创建一个
[1] Nitin H. Vaidya,et al. Reliable broadcast in radio networks: the bounded collision case , 2006, PODC '06.
[2] Dariusz R. Kowalski,et al. On selection problem in radio networks , 2005, PODC '05.
[3] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[4] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[5] F. Jiang,et al. Exploiting the capture effect for collision detection and recovery , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..
[6] Andrea E. F. Clementi,et al. Round Robin is optimal for fault-tolerant broadcasting on wireless networks , 2001, J. Parallel Distributed Comput..
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Andrzej Pelc,et al. Fault-Tolerant Broadcasting in Radio Networks , 2001, J. Algorithms.
[9] Timothy X. Brown,et al. Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.
[10] Chiu-Yuen Koo,et al. Broadcast in radio networks tolerating byzantine adversarial behavior , 2004, PODC '04.
[11] Nitin H. Vaidya,et al. On reliable broadcast in a radio network , 2005, PODC '05.
[12] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[13] Andrzej Pelc,et al. Broadcasting with locally bounded Byzantine faults , 2005, Inf. Process. Lett..
[14] Mika Ståhlberg. Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .
[15] Andrea E. F. Clementi,et al. Selective families, superimposed codes, and broadcasting on unknown radio networks , 2001, SODA '01.
[16] Andrzej Lingas,et al. The do-all problem in broadcast networks , 2001, PODC '01.
[17] Andrzej Pelc,et al. Feasibility and complexity of broadcasting with random transmission failures , 2005, PODC '05.