An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network
暂无分享,去创建一个
[1] Deborah Estrin,et al. Directed diffusion for wireless sensor networking , 2003, TNET.
[2] Thomas F. La Porta,et al. Establishing Pair-Wise Keys in Heterogeneous Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[3] Ian F. Akyildiz,et al. A survey on wireless multimedia sensor networks , 2007, Comput. Networks.
[4] Sajal K. Das,et al. Group key distribution via local collaboration in wireless sensor networks , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[5] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[6] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[7] Deborah Estrin,et al. Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .
[8] John Stanley,et al. Applying Video Sensor Networks to Nearshore Environment Monitoring , 2003, IEEE Pervasive Comput..
[9] T. La Porta,et al. On supporting distributed collaboration in sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[10] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .
[11] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[12] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[13] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[14] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[15] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.