Increasing attack resiliency of wireless ad hoc and sensor networks
暂无分享,去创建一个
[1] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[2] Harald Vogt,et al. Integrity preservation for communication in sensor networks , 2004 .
[3] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[4] L. Craig,et al. Overlapping Tessellated Communications Networks , 1962 .
[5] B. Hayes. Graph Theory in Practice: Part II , 2000, American Scientist.
[6] P. Baran,et al. On Distributed Communications Networks , 1964 .
[7] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[8] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] Harald Vogt,et al. Exploring Message Authentication in Sensor Networks , 2004, ESAS.
[10] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.