How to Secure a Wireless Sensor Network
暂无分享,去创建一个
[1] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[2] D. Curtis Schleher,et al. Electronic Warfare in the Information Age , 1999 .
[3] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] Don J. Torrieri,et al. Fundamental limitations on repeater jamming of frequency-hopping communications , 1989, IEEE J. Sel. Areas Commun..
[5] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[6] Deborah Estrin,et al. Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.
[7] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[8] Henry Samueli,et al. Analysis and design of a frequency-hopped spread-spectrum transceiver for wireless personal communications , 2000, IEEE Trans. Veh. Technol..
[9] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[10] Pietro Michiardi,et al. Prevention of denial of service attacks and selfishness in mobile ad hoc networks , 2002 .
[11] Levente Buttyán,et al. Towards provable security for ad hoc routing protocols , 2004, SASN '04.
[12] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[13] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[14] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[15] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[16] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[17] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[18] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[19] Bohn Stafleu van Loghum,et al. Online … , 2002, LOG IN.
[20] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[21] Yee Wei Law,et al. Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract) , 2004 .
[22] Deborah Estrin,et al. Networking issues in wireless sensor networks , 2003, J. Parallel Distributed Comput..
[23] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[24] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[25] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[26] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[27] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[28] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[29] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[30] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[31] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[32] Paul J.M. Havinga,et al. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches , 2004 .
[33] LawYee Wei,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006 .
[34] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[35] Andrew Blyth,et al. Secure coding — principles and practices , 2004 .
[36] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[37] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[38] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[39] Bart Preneel,et al. Cryptographic Primitives for Information Authentication - State of the Art , 1997, State of the Art in Applied Cryptography.
[40] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[41] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[42] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[43] Tr1000 916.50 Mhz Hybrid Transceiver , .
[44] Michele Zorzi,et al. Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Energy and Latency Performance , 2003, IEEE Trans. Mob. Comput..
[45] Michele Zorzi,et al. Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Multihop Performance , 2003, IEEE Trans. Mob. Comput..
[46] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[47] Kenneth R. van Wyk,et al. Secure Coding: Principles and Practices , 2003 .
[48] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[49] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[50] Gregory J. Pottie,et al. Wireless integrated network sensors: toward low-cost and robust self-organizing security networks , 1999, Other Conferences.
[51] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[52] Guevara Noubir,et al. On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.
[53] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[54] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[55] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[56] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[57] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[58] P.J.M. Havinga,et al. AmbientRT - real time system software support for data centric sensor networks , 2004, Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004..
[59] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[60] George C. Necula,et al. Proof-carrying code: design, implementation and applications (abstract) , 2000, PPDP.
[61] Pietro Michiardi,et al. Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .
[62] Liesbet Van der Perre,et al. Optimizing transmission and shutdown for energy-efficient packet scheduling in sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[63] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[64] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.