Securing Mobile Unattended WSNs against a Mobile Adversary
暂无分享,去创建一个
Claudio Soriente | Roberto Di Pietro | Gene Tsudik | Gabriele Oligeri | G. Tsudik | C. Soriente | R. D. Pietro | G. Oligeri | Claudio Soriente
[1] Gene Tsudik,et al. DISH: Distributed Self-Healing , 2008, SSS.
[2] Marius Iosifescu,et al. Finite Markov Processes and Their Applications , 1981 .
[3] Claudio Soriente,et al. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks , 2008, 2008 Symposium on Reliable Distributed Systems.
[4] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[5] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[6] Mihir Bellare,et al. Key Insulation and Intrusion Resilience over a Public Channel , 2009, CT-RSA.
[7] Eylem Ekici,et al. Mobility-based communication in wireless sensor networks , 2006, IEEE Communications Magazine.
[8] Roberto Di Pietro,et al. Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.
[9] Claudio Soriente,et al. Intrusion-Resilience in Mobile Unattended WSNs , 2010, 2010 Proceedings IEEE INFOCOM.
[10] Claudio Soriente,et al. Data Security in Unattended Wireless Sensor Networks , 2009, IEEE Transactions on Computers.
[11] Ran Canetti,et al. Maintaining Security in the Presence of Transient Faults , 1994, CRYPTO.
[12] Roberto Di Pietro,et al. Mobility and Cooperation to Thwart Node Capture Attacks in MANETs , 2009, EURASIP J. Wirel. Commun. Netw..
[13] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[14] Anish Arora,et al. Whisper: Local Secret Maintenance in Sensor Networks , 2003 .
[15] Donald F. Towsley,et al. Mobility improves coverage of sensor networks , 2005, MobiHoc '05.
[16] Victor Shoup,et al. OAEP Reconsidered , 2001, CRYPTO.
[17] Thomas F. La Porta,et al. Sensor relocation in mobile sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[18] Sourav Mukhopadhyay,et al. Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network , 2007 .
[19] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[20] Claudio Soriente,et al. Collaborative authentication in unattended WSNs , 2009, WiSec '09.
[21] Claudio Soriente,et al. Self-healing in unattended wireless sensor networks , 2012, TOSN.
[22] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[23] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..