Routing-guided authentication in Wireless Sensor Networks
暂无分享,去创建一个
[1] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[2] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[3] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[4] Philip Levis,et al. TinyOS Programming: Introduction , 2009 .
[5] Andreas Willig,et al. Protocols and Architectures for Wireless Sensor Networks , 2005 .
[6] Joonsang Baek,et al. Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.
[7] Taeshik Shon,et al. Sensor Authentication in Dynamic Wireless Sensor Network Environments , 2012 .
[8] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[9] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[10] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[11] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[12] Thomas Y. C. Woo,et al. Authentication for distributed systems , 1997, Computer.
[13] David Boyle,et al. Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.
[14] NetworksWendi Rabiner Heinzelman,et al. Adaptive Proto ols for Information Dissemination in Wireless Sensor , 1999 .
[15] Imad Mahgoub,et al. A Hierarchical Key Establishment Scheme forWireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).
[16] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[17] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[18] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[19] Wendi B. Heinzelman,et al. Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.
[20] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[21] P. Udaya Sri S. Sravani G. Priyankia. Security protocols for Wireless Sensor Networks , 2017 .
[22] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[23] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[24] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[25] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[26] Ashok Kumar Das. A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge , 2011, ArXiv.