Real-Time Detection of Clone Attacks in Wireless Sensor Networks
暂无分享,去创建一个
[1] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[2] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[3] Xiuzhen Cheng,et al. iTPS: an improved location discovery scheme for sensor networks with long-range beacons , 2005, J. Parallel Distributed Comput..
[4] Haiyun Luo,et al. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.
[5] Arkadii G. D'yachkov,et al. Optimal superimposed codes and designs for Renyi's search model , 2002 .
[6] Fang Liu,et al. TPSS: A Time-Based Positioning Scheme for Sensor Networks with Short Range Beacons , 2005, ICCNMC.
[7] Anthony J. Macula,et al. A simple construction of d-disjunct matrices with certain constant weights , 1996, Discret. Math..
[8] Xiuzhen Cheng,et al. Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks , 2007, MobiCom '07.
[9] Xiuzhen Cheng,et al. Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[10] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[11] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[12] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[13] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[14] Ahmad Khonsari,et al. Misbehavior resilient multi-path data transmission in mobile ad-hoc networks , 2006, SASN '06.
[15] Thomas F. La Porta,et al. SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.