Secure Wireless Sensor Networks
暂无分享,去创建一个
[1] Leila Ben Saad,et al. Lifetime optimization of sensor-cloud systems , 2015, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS).
[2] Yang Xiao,et al. PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks , 2015, Wirel. Commun. Mob. Comput..
[3] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[4] Ke Wang,et al. Rotation-based privacy-preserving data aggregation in wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[5] Mauro Conti,et al. MOSES: Supporting and Enforcing Security Profiles on Smartphones , 2014, IEEE Transactions on Dependable and Secure Computing.
[6] Sushil Jajodia,et al. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact , 2014, IEEE Transactions on Information Forensics and Security.
[7] Liejun Wang,et al. A Bloom Filter and Matrix-based Protocol for Detecting Node Replication Attack , 2014, J. Networks.
[8] Lei Wang,et al. Privacy-preserving Data Aggregation Scheme Based on the P-Function Set in Wireless Sensor Networks , 2014, Ad Hoc Sens. Wirel. Networks.
[9] D. Bhattacharya. Secure Data Aggregation in Wireless Sensor Networks , 2014 .
[10] Ivan Stojmenovic,et al. Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.
[11] Sanjay Kumar Madria,et al. PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.
[12] Sandro Etalle,et al. Hybrid Static-Runtime Information Flow and Declassification Enforcement , 2013, IEEE Transactions on Information Forensics and Security.
[13] R. Sathish,et al. Dynamic Detection of Clone Attack in Wireless Sensor Networks , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[14] Sushil Jajodia,et al. Preserving privacy against external and internal threats in WSN data aggregation , 2013, Telecommun. Syst..
[15] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation for Information Collection , 2011, TOSN.
[16] Roberto Di Pietro,et al. Events privacy in WSNs: A new model and its application , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[17] Roberto Di Pietro,et al. Time Warp: How Time Affects Privacy in LBSs , 2010, ICICS.
[18] Sushil Jajodia,et al. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[19] Ghassan O. Karame,et al. Integrity Regions: Authentication through Presence in Wireless Networks , 2006, IEEE Transactions on Mobile Computing.
[20] Sushil Jajodia,et al. Secure median computation in wireless sensor networks , 2009, Ad Hoc Networks.
[21] Sushil Jajodia,et al. Securely computing an approximate median in wireless sensor networks , 2008, SecureComm.
[22] Julinda Stefa,et al. Routing in Outer Space , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[23] Sencun Zhu,et al. Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.
[24] Salah A. Aly,et al. Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.
[25] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[26] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.
[27] Nidal Nasser,et al. Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks , 2008, Secur. Commun. Networks.
[28] Srdjan Capkun,et al. Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.
[29] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[30] Sushil Jajodia,et al. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[31] Sencun Zhu,et al. Sensor node compromise detection: the location perspective , 2007, IWCMC.
[32] Hai Liu,et al. A Distributed and Efficient Flooding Scheme Using 1-Hop Information in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[33] Ness B. Shroff,et al. Paradox of Shortest Path Routing for Large Multi-Hop Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[34] Roberto Di Pietro,et al. Robust RSA distributed signatures for large-scale long-lived ad hoc networks , 2007, J. Comput. Secur..
[35] John S. Baras,et al. A Robust, Distributed TGDH-based Scheme for Secure Group Communications in MANET , 2006, 2006 IEEE International Conference on Communications.
[36] Sushil Jajodia,et al. Attack-resilient hierarchical data aggregation in sensor networks , 2006, SASN '06.
[37] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[38] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[39] Brian Neil Levine,et al. Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[40] Jorma T. Virtamo,et al. Spatial node distribution of the random waypoint mobility model with applications , 2006, IEEE Transactions on Mobile Computing.
[41] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[42] Ness B. Shroff,et al. Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[43] Mingyan Liu,et al. Self-monitoring of wireless sensor networks , 2006, Comput. Commun..
[44] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[45] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[46] Weisong Shi,et al. Enforcing Cooperative Resource Sharing in Untrusted P2P Computing Environments , 2005, Mob. Networks Appl..
[47] Heribert Baldus,et al. A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[48] Radha Poovendran,et al. SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.
[49] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[50] Jun Luo,et al. Joint mobility and routing for lifetime elongation in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[51] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[52] Weisong Shi,et al. PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[53] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[54] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[55] Srinivasan Seshan,et al. Synopsis diffusion for robust aggregation in sensor networks , 2004, SenSys '04.
[56] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[57] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[58] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[59] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[60] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[61] Yongdae Kim,et al. Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.
[62] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[63] Andrea Vitaletti,et al. Localized Techniques for Broadcasting in Wireless Sensor Networks , 2007, Algorithmica.
[64] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[65] Feng Bao,et al. Computing of trust in wireless networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[66] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[67] Divyakant Agrawal,et al. Medians and beyond: new aggregation techniques for sensor networks , 2004, SenSys '04.
[68] Boaz Patt-Shamir. A note on efficient aggregate queries in sensor networks , 2004, PODC '04.
[69] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[70] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[71] Alan D. George,et al. Gossip-Style Failure Detection and Distributed Consensus for Scalable Heterogeneous Clusters , 2004, Cluster Computing.
[72] Hans Eberle,et al. Energy Analysis of Public-Key Cryptography on Small Wireless Devices , 2004 .
[73] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[74] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[75] Ahmed Helmy,et al. Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.
[76] James Newsome,et al. GEM: Graph EMbedding for routing and data-centric storage in sensor networks without geographic information , 2003, SenSys '03.
[77] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[78] Guevara Noubir,et al. Secure multicast groups on ad hoc networks , 2003, SASN '03.
[79] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[80] Sencun Zhu,et al. LEAP: efficient security mechanisms for large-scale distributed sensor networks , 2003, CCS '03.
[81] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[82] Roberto Di Pietro,et al. Security and privacy issues of handheld and wearable wireless devices , 2003, CACM.
[83] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[84] Lui Sha,et al. Real-time communication and coordination in embedded sensor networks , 2003, Proc. IEEE.
[85] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[86] Jan M. Rabaey,et al. A study of low level vibrations as a power source for wireless sensor nodes , 2003, Comput. Commun..
[87] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[88] Radha Poovendran,et al. Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[89] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[90] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[91] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[92] Peter Steenkiste,et al. Protecting Access to People Location Information , 2003, SPC.
[93] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[94] Naohiro Hayashibara,et al. Failure detectors for large-scale distributed systems , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..
[95] Asim Smailagic,et al. Location sensing and privacy in a context-aware computing environment , 2002, IEEE Wirel. Commun..
[96] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[97] Mingyan Liu,et al. A distributed monitoring mechanism for wireless sensor networks , 2002, WiSE '02.
[98] David Levin,et al. Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.
[99] Tracy Camp,et al. Comparison of broadcasting techniques for mobile ad hoc networks , 2002, MobiHoc '02.
[100] Shigeki Goto,et al. A new intrusion detection method based on process profiling , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002).
[101] Radha Poovendran,et al. Secure Broadcast in Energy-Aware Wireless Sensor Networks , 2002 .
[102] Haiyun Luo,et al. Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .
[103] Einar Snekkenes,et al. Concepts for personal location privacy policies , 2001, EC '01.
[104] Andy Oram,et al. Peer-to-Peer: Harnessing the Power of Disruptive Technologies , 2001 .
[105] Marc Langheinrich,et al. First Experiences with Bluetooth in the Smart-Its Distributed Sensor Network , 2001 .
[106] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[107] Jan M. Rabaey,et al. PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking , 2000, Computer.
[108] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[109] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[110] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[111] Deborah Estrin,et al. Next Century Challenges: Mobile Networking for Smart Dust , 1999, MobiCom 1999.
[112] Bruce G. Lindsay,et al. Approximate medians and other quantiles in one pass and with limited memory , 1998, SIGMOD '98.
[113] Peter J. Haas,et al. Improved histograms for selectivity estimation of range predicates , 1996, SIGMOD '96.
[114] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[115] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[116] Imrich Chlamtac,et al. The P2 algorithm for dynamic calculation of quantiles and histograms without storing observations , 1985, CACM.
[117] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[118] Adi Shamir,et al. How to share a secret , 1979, CACM.
[119] J. Ian Munro,et al. Selection and sorting with limited storage , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).
[120] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .