On the security and energy consumption estimation of wireless sensor network protocols
暂无分享,去创建一个
[1] Yang Xiao,et al. MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[2] Vinod Kumar,et al. Evaluation of Security Conditions of Protocols for Data Routing in Wireless Sensors Networks , 2011 .
[3] Morris J. Dworkin,et al. SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .
[4] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[5] Andrea Vitaletti,et al. Rijndael for Sensor Networks: Is Speed the Main Issue? , 2007, Electron. Notes Theor. Comput. Sci..
[6] John Anderson,et al. An analysis of a large scale habitat monitoring application , 2004, SenSys '04.
[7] Fangzhou Zhang,et al. Rijndael Arithmetic Analyse and Optimize , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[8] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[9] Fumiyuki Adachi,et al. Time division multiple access methods for wireless personal communications , 1995, IEEE Commun. Mag..
[10] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[11] Gyula Simon,et al. The flooding time synchronization protocol , 2004, SenSys '04.
[12] Zhang Jizan. Multi-path routing protocol of node cover layer in WSN , 2010 .
[13] Abraham O. Fapojuwo,et al. A centralized energy-efficient routing protocol for wireless sensor networks , 2005, IEEE Communications Magazine.
[14] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[15] Luca Benini,et al. Dynamic Power Management , 1998 .
[16] Guido Bertoni,et al. Efficient Software Implementation of AES on 32-Bit Platforms , 2002, CHES.
[17] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[18] Lin Shen,et al. A New Kind of Cluster-based Key Management Protocol in Wireless Sensor Network , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.
[19] Deborah Estrin,et al. A wireless sensor network For structural monitoring , 2004, SenSys '04.
[20] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[21] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[22] Reiner Dojen,et al. A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications , 2011, Int. J. Inf. Secur. Priv..
[23] T. Coffey,et al. Establishing and fixing a freshness flaw in a key-distribution and Authentication Protocol , 2008, 2008 4th International Conference on Intelligent Computer Communication and Processing.
[24] Mohamad R. Neilforoshan. Network security architecture , 2004 .
[25] Elfed Lewis,et al. Efficiently securing data on a wireless sensor network , 2007 .
[26] John A. Stankovic,et al. LUSTER: wireless sensor network for environmental research , 2007, SenSys '07.
[27] Saurabh Bagchi,et al. Optimizing AES for embedded devices and wireless sensor networks , 2008 .
[28] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[29] Peng Ning,et al. Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.
[30] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[31] Suho Park. Routing Security in Sensor Network: HELLO Flood Attack and Defense , 2005 .
[32] Philip Levis,et al. The nesC language: a holistic approach to networked embedded systems , 2003, SIGP.
[33] John R. Vacca. Computer and Information Security Handbook , 2009 .
[34] Md. Abdul Hamid,et al. Routing Security in Sensor Network : HELLO Flood Attack and Defense , 2005 .
[35] Nuraj Pradhan,et al. Energy efficient distributed power management algorithm with directional antenna for wireless sensor networks , 2011, 34th IEEE Sarnoff Symposium.
[36] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[37] Reiner Dojen,et al. The concept of layered proving trees and its application to the automation of security protocol verification , 2005, TSEC.
[38] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[39] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[40] Bernhard Sterzbach. GPS-based Clock Synchronization in a Mobile, Distributed Real-Time System , 2004, Real-Time Systems.
[41] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[42] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[43] Aleksandar Milenkovic,et al. Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..
[44] Kaveh Pahlavan,et al. Wireless Information Networks: Pahlavan/Wireless Information Networks, Second Edition , 2005 .
[45] Gyula Simon,et al. Countersniper system for urban warfare , 2005, TOSN.
[46] Walter Tuchman,et al. A brief history of the data encryption standard , 1997 .
[47] Sang-Ha Kim,et al. Scalable and robust data dissemination for large-scale wireless sensor networks , 2010, IEEE Transactions on Consumer Electronics.
[48] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[49] Gerhard P. Hancke,et al. Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.
[50] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[51] Ashok Kumar Turuk,et al. A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[52] Nael B. Abu-Ghazaleh,et al. A taxonomy of wireless micro-sensor network models , 2002, MOCO.
[53] Gerhard P. Hancke,et al. Industrial Wireless Sensor Networks , 2011 .
[54] Saïd Bettayeb,et al. Efficient Algorithms for Secure Multicast key Management , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[55] Sang Hyuk Son,et al. The price of security in wireless sensor networks , 2010, Comput. Networks.
[56] William Stallings,et al. Cryptography and network security , 1998 .
[57] Xiaotie Deng,et al. TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.
[58] Rodrigo Roman,et al. A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks , 2008, CANS.
[59] Jie Zhang,et al. RANC: Opportunistic Multi-path Routing Protocol in WSNs Using Reality-Aware Network Coding , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.
[60] Yih-Chun Hu,et al. Wormhole Detection in Wireless Ad Hoc Networks , 2002 .
[61] Catherine Rosenberg,et al. A minimum cost heterogeneous sensor network with a lifetime constraint , 2005, IEEE Transactions on Mobile Computing.
[62] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[63] R. Srinivasan,et al. AC: Cluster Based Secure Routing Protocol for WSN , 2007, International Conference on Networking and Services (ICNS '07).
[64] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[65] Kris Steenhaut,et al. A traffic-adaptive multi-channel MAC protocol for wireless sensor networks , 2010, International Conference on Communications and Electronics 2010.
[66] Yongtae Shin,et al. AES Implementation and Performance Evaluation on 8-bit Microcontrollers , 2009, ArXiv.
[67] Wu Xiao-bei. Survey on sensor deployment problem in wireless sensor networks , 2008 .
[68] Fan Zhang,et al. Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node , 2011, Int. J. Sens. Networks.
[69] Yang Yang,et al. MRBCH: A Multi-Path Routing Protocol Based on Credible Cluster Heads for Wireless Sensor Networks , 2010, Int. J. Commun. Netw. Syst. Sci..
[70] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .
[71] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[72] Tomoyuki Ohta,et al. Secure decentralized data transfer against node capture attacks for wireless sensor networks , 2009, 2009 International Symposium on Autonomous Decentralized Systems.
[73] Secure cell relay routing protocol for sensor networks: Research Articles , 2006 .
[74] Mazliza Othman. Principles of mobile computing and communications , 2007 .
[75] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[76] P. Baran,et al. On Distributed Communications Networks , 1964 .
[77] Phillip Rogaway,et al. Nonce-Based Symmetric Encryption , 2004, FSE.
[78] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[79] Fan Zhang,et al. On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks , 2008, 2008 IEEE International Performance, Computing and Communications Conference.
[80] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[81] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[82] Dajin Wang. An Energy-efficient Clusterhead Assignment Scheme for Hierarchical Wireless Sensor Networks , 2008, Int. J. Wirel. Inf. Networks.
[83] Saurabh Ganeriwal,et al. Timing-sync protocol for sensor networks , 2003, SenSys '03.
[84] Masayuki Kanda,et al. Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function , 2000, Selected Areas in Cryptography.
[85] Hiromitsu Kumamoto,et al. Analysis of Information Security Problem by Probabilistic Risk Assessment , 2009 .
[86] Thomas Engel,et al. Design of an enhanced energy conserving routing protocol based on route diversity in wireless sensor networks , 2010, 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).
[87] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[88] Scott F. Midkiff,et al. Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.
[89] Christian Steger,et al. Evaluation of component-aware dynamic voltage scaling for mobile devices and wireless sensor networks , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[90] Virendra Pal Singh,et al. Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .
[91] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[92] Reiner Dojen,et al. Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications , 2011, Comput. Electr. Eng..
[93] Krishna M. Sivalingam,et al. Data Gathering Algorithms in Sensor Networks Using Energy Metrics , 2002, IEEE Trans. Parallel Distributed Syst..
[94] Berk Sunar,et al. Energy Comparison of AES and SHA-1 for Ubiquitous Computing , 2006, EUC Workshops.
[95] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[96] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.