A security testing approach for WSN protocols based on object-oriented attack model
暂无分享,去创建一个
Chao Yang | Yue Qi | Yong Zeng | Qingqi Pei | Shu-po Bu | Chao Yang | Qingqi Pei | Yue Qi | Yong Zeng | Shu-po Bu
[1] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[2] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[3] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[4] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[5] StakhanovaNatalia,et al. Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems , 2007 .
[6] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[7] Xia Wang,et al. Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems , 2007, Int. J. Inf. Comput. Secur..
[8] M. Laakso,et al. A case for protocol dependency , 2005, First IEEE International Workshop on Critical Infrastructure Protection (IWCIP'05).
[9] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[10] James P. McDermott,et al. Attack net penetration testing , 2001, NSPW '00.
[11] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.