Efficient and Robust Secure Aggregation for Sensor Networks
暂无分享,去创建一个
Panagiotis Papadimitratos | Karl Aberer | Marcin Poturalski | Jean-Pierre Hubaux | Parisa Haghani | K. Aberer | J. Hubaux | Panos Papadimitratos | P. Haghani | Marcin Poturalski
[1] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2007, Ad Hoc Networks.
[2] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[3] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[4] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[5] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[6] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[9] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[10] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[11] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[12] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[13] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[14] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[15] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[16] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[17] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.