Security in UWANs
暂无分享,去创建一个
[1] Zhijie Jerry Shi,et al. RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements , 2016, IEEE Communications Magazine.
[2] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[3] Rui Zhang,et al. Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[4] Mari Carmen Domingo,et al. Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.
[5] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[6] Roberto Petroccia,et al. CARP: A Channel-aware routing protocol for underwater acoustic wireless networks , 2015, Ad Hoc Networks.
[7] Gianluca Dini,et al. A cryptographic suite for underwater cooperative applications , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[8] Gianluca Dini,et al. A Secure Communication Suite for Underwater Acoustic Sensor Networks , 2012, Sensors.
[9] Milica Stojanovic,et al. On the relationship between capacity and distance in an underwater acoustic communication channel , 2007, MOCO.
[10] Christof Zalka,et al. Shor's discrete logarithm quantum algorithm for elliptic curves , 2003, Quantum Inf. Comput..
[11] Yi Xu,et al. Research Advances on Security Problems of Underwater Sensor Networks , 2011 .
[12] Athanasios V. Vasilakos,et al. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[13] Dario Pompili,et al. A CDMA-based Medium Access Control for UnderWater Acoustic Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[14] Michael Zuba,et al. Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks , 2015, Secur. Commun. Networks.
[15] Mohsen Guizani,et al. An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network , 2015, IEEE Transactions on Mobile Computing.
[16] Bharat K. Bhargava,et al. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.
[17] Guangjie Han,et al. Detecting Sybil attack based on state information in Underwater Wireless Sensor Networks , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).
[18] Athanasios V. Vasilakos,et al. Jamming in underwater sensor networks: detection and mitigation , 2012, IET Commun..
[19] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[20] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[21] Helge Rustad. A Lightweight Protocol Suite for Underwater Communication , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[22] Xiuzhen Cheng,et al. Silent Positioning in Underwater Acoustic Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.
[23] Limin Sun,et al. Security and privacy in localization for underwater sensor networks , 2015, IEEE Communications Magazine.
[24] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[25] Guangjie Han,et al. A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.
[26] Yi Huang,et al. Experimental study of secret key generation in underwater acoustic channels , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.
[27] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[28] Sachin Katti,et al. Embracing wireless interference: analog network coding , 2007, SIGCOMM.
[29] Yang Xiao,et al. Vertical and horizontal synchronization services with outlier detection in underwater acoustic networks , 2008 .
[30] Raymond Knopp,et al. A practical method for wireless channel reciprocity exploitation through relative calibration , 2005, Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005..
[31] Mauro Conti,et al. Secure underwater acoustic networks: Current and future research directions , 2016, 2016 IEEE Third Underwater Communications and Networking Conference (UComms).
[32] Gianluca Dini,et al. SeFLOOD: A secure network discovery protocol for Underwater Acoustic Networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[33] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[34] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[35] Chiara Petrioli,et al. R-CARP: A Reputation Based Channel Aware Routing Protocol for Underwater Acoustic Sensor Networks , 2015, WUWNet.
[36] Shengming Jiang,et al. On Securing Underwater Acoustic Networks: A Survey , 2019, IEEE Communications Surveys & Tutorials.
[37] W. Seah,et al. An Area Localization Scheme for Underwater Sensor Networks , 2006, OCEANS 2006 - Asia Pacific.
[38] Ítalo S. Cunha,et al. End-to-end authentication in Under-Water Sensor Networks , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[39] Gianluca Dini,et al. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network , 2012, Sensors.
[40] Deying Li,et al. A Low Computational Complexity Authentication Scheme in Underwater Wireless Sensor Network , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).
[41] Dario Pompili,et al. Overview of networking protocols for underwater wireless communications , 2009, IEEE Communications Magazine.
[42] Alfred Menezes,et al. PGP in Constrained Wireless Devices , 2000, USENIX Security Symposium.
[43] Dimitrios Koutsonikolas,et al. Securing underwater acoustic communications through analog network coding , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[44] Soo-Hyun Park,et al. CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks , 2016, Wirel. Pers. Commun..
[45] Sabu M. Thampi,et al. Secure communication in mobile underwater wireless sensor networks , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[46] Mauro Conti,et al. Toward the Development of Secure Underwater Acoustic Networks , 2017, IEEE Journal of Oceanic Engineering.
[47] Chiara Petrioli,et al. SecFUN: Security framework for underwater acoustic sensor networks , 2015, OCEANS 2015 - Genova.
[48] Kiyomichi Araki,et al. Overview of Elliptic Curve Cryptography , 1998, Public Key Cryptography.
[49] Guangjie Han,et al. A Trust Cloud Model for Underwater Wireless Sensor Networks , 2017, IEEE Communications Magazine.
[50] Mauro Conti,et al. Attack Resilient Underwater Networks Through Software Defined Networking , 2014, WUWNet.
[51] Isaac L. Chuang,et al. Quantum Computation and Quantum Information (10th Anniversary edition) , 2011 .
[52] Emrecan Demirors,et al. Advances in Underwater Acoustic Networking , 2013, Mobile Ad Hoc Networking.
[53] Wenliang Du,et al. Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.
[54] Bharat K. Bhargava,et al. Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .
[55] Wei Zhou,et al. Security in Underwater Sensor Network , 2010, 2010 International Conference on Communications and Mobile Computing.
[56] B. R. Badrinath,et al. DV Based Positioning in Ad Hoc Networks , 2003, Telecommun. Syst..
[57] Robert J. Urick,et al. Principles of underwater sound , 1975 .
[58] Elaine B. Barker,et al. SP 800-56B. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography , 2009 .
[59] Rajashri Khanai,et al. Localization, routing and its security in UWSN — A survey , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[60] Ning Sun,et al. Secure communication for underwater acoustic sensor networks , 2015, IEEE Communications Magazine.
[61] Ming Li,et al. Cognitive Code-Division Links with Blind Primary-System Identification , 2011, IEEE Transactions on Wireless Communications.
[62] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[63] Srdjan Capkun,et al. Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.
[64] Gianluca Dini,et al. S2RP: a Secure and Scalable Rekeying Protocol for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[65] Cheng Li,et al. Design and Evaluation of a New Localization Scheme for Underwater Acoustic Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[66] Michael Zuba,et al. Uncooperative localization improves attack performance in Underwater Acoustic Networks , 2014, 2014 IEEE Conference on Communications and Network Security.
[67] Ian F. Akyildiz,et al. A survey on wireless mesh networks , 2005, IEEE Communications Magazine.
[68] Ming Li,et al. Waveform Design for Secure SISO Transmissions and Multicasting , 2013, IEEE Journal on Selected Areas in Communications.
[69] Lei Yu,et al. A Trust Model Based on Subjective Logic for Multi-Domains in Grids , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.