On communication security in wireless ad-hoc sensor networks
暂无分享,去创建一个
Miodrag Potkonjak | Mani B. Srivastava | Sasha Slijepcevic | Vlasios Tsiatsis | Scott Zimbeck | M. Srivastava | M. Potkonjak | V. Tsiatsis | S. Zimbeck | S. Slijepcevic
[1] Elaine B. Barker,et al. Status Report on the First Round of the Development of the Advanced Encryption Standard , 1999, Journal of Research of the National Institute of Standards and Technology.
[2] Joseph P. Macker,et al. Techniques and issues in multicast security , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).
[3] Mani Srivastava,et al. Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..
[4] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[5] David L. Tennenhouse,et al. Proactive computing , 2000, Commun. ACM.
[6] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[7] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[8] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[9] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[10] Satish Kumar,et al. Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.
[11] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[12] Gregory J. Pottie,et al. Development platform for self-organizing wireless sensor networks , 1999, Defense, Security, and Sensing.
[13] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[14] Deborah Estrin,et al. Embedding the Internet: introduction , 2000, Commun. ACM.
[15] Guevara Noubir,et al. Secure multicast groups on ad hoc networks , 2003, SASN '03.
[16] Li Gong,et al. Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.
[17] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[18] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[19] J. Rabaey,et al. PicoRadio: Ad-hoc wireless networking of ubiquitous low-energy sensor/monitor nodes , 2000, Proceedings IEEE Computer Society Workshop on VLSI 2000. System Design for a System-on-Chip Era.
[20] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[21] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[22] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[23] Gaurav S. Sukhatme,et al. Embedding robots into the Internet , 2000, Commun. ACM.
[24] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[25] Chris Hanson,et al. Amorphous computing , 2000, Commun. ACM.
[26] Ahmed Helmy,et al. Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.
[27] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[28] Gaetano Borriello,et al. Embedded computation meets the World Wide Web , 2000, Commun. ACM.
[29] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[30] Charles P. Pfleeger,et al. Security in computing , 1988 .
[31] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[32] Deborah Estrin,et al. Time synchronization for wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.