CRINet: A secure and fault-tolerant data collection scheme using 3-way forwarding and group key management in wireless sensor networks
暂无分享,去创建一个
[1] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[2] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[3] Suman Roy,et al. Computationally and Resource Efficient Group Key Agreement for Ad Hoc Sensor Networks , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.
[4] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[5] Mohamed F. Younis,et al. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.
[6] Mohamed Eltoweissy,et al. Dynamic combinatorial key management scheme for sensor networks , 2006, Wirel. Commun. Mob. Comput..
[7] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[8] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[9] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[10] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[11] Mohamed Eltoweissy,et al. Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.
[12] Yiwei Thomas Hou,et al. BeamStar: An Edge-Based Approach to Routing in Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[13] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[14] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[15] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[16] Adi Shamir,et al. How to share a secret , 1979, CACM.
[17] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.