Security and efficient data dissemination over wireless sensor network with raptor codes
暂无分享,去创建一个
Jingyu Wang | Lei Zhang | Qi Qi | Jianxin Liao | Tong Xu | Minyan Liao
[1] Peng Ning,et al. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[2] David Starobinski,et al. Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[3] Zeng Yong,et al. Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.
[4] Xiaomin Zhu,et al. IIN model: modifications and case study , 2001, Comput. Networks.
[5] Michele Zorzi,et al. SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[6] David E. Culler,et al. The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.
[7] Dirk Westhoff,et al. Security enhanced multi-hop over the air reprogramming with Fountain Codes , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[8] Nazanin Rahnavard,et al. FTS: A Distributed Energy-Efficient Broadcasting Scheme Using Fountain Codes for Multihop Wireless Networks , 2010, IEEE Transactions on Communications.
[9] Stephen B. Wicker,et al. Secrecy and reliability using Raptor codes in the presence of a wiretapper in a multiple path wireless network , 2009, 2009 International Conference on Wireless Communications & Signal Processing.
[10] Rui Zhang,et al. LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems.