DARE: evaluating Data Accuracy using node REputation
暂无分享,去创建一个
[1] Vikram Srinivasan,et al. Information Coverage and Network Lifetime in Energy Constrained Wireless Sensor Networks , 2007 .
[2] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[3] Sabrina Sicari,et al. SeDAP: Secure Data Aggregation Protocol in Privacy Aware Wireless Sensor Networks , 2010, S-CUBE.
[4] Dirk Westhoff,et al. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[5] Yacine Challal,et al. SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks , 2007 .
[6] Fabrizio Granelli,et al. Energino: A hardware and software solution for energy consumption monitoring , 2012, 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).
[7] Gennaro Boggia,et al. DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks , 2012, J. Syst. Softw..
[8] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[9] Mattia Monga,et al. Assessing data quality by a cross-layer approach , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.
[10] Roberto Riggio,et al. Performance Evaluation of an Hybrid Mesh and Sensor Network , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[11] Wensheng Zhang,et al. Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[12] D. Bhattacharya. Secure Data Aggregation in Wireless Sensor Networks , 2014 .
[13] Mattia Monga,et al. Localization security in Wireless Sensor Networks as a non-cooperative game , 2010, International Congress on Ultra Modern Telecommunications and Control Systems.
[14] Mattia Monga,et al. On the impact of localization data in wireless sensor networks with malicious nodes , 2009, SPRINGL '09.
[15] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[16] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[17] Claudio Soriente,et al. Collaborative authentication in unattended WSNs , 2009, WiSec '09.
[18] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[19] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[20] Sabrina Sicari,et al. Improving data quality using a cross layer protocol in wireless sensor networks , 2012, Comput. Networks.
[21] Sabrina Sicari,et al. Cross Layer Data Assessment in Wireless Sensor Networks , 2012, SENSORNETS.
[22] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[23] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[24] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[25] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[26] Yuguang Fang,et al. Hardware and software solutions for wireless mesh network testbeds , 2008, IEEE Communications Magazine.
[27] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.