The reliability of data protection algorithm based on check code in wireless sensor networks
暂无分享,去创建一个
[1] Xiang Yang Li,et al. An Improved Watermarking Scheme for Secure Data Aggregation in WSNs , 2014 .
[2] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[3] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[4] Ran Wolff,et al. Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .
[5] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[6] Kalpana Sharma,et al. Wireless Sensor Networks: An Overview on its Security Threats , 2010 .
[7] T. Newe,et al. A Survey of Authentication Mechanisms: Authentication for Ad-Hoc Wireless Sensor Networks , 2007, 2007 IEEE Sensors Applications Symposium.
[8] Ibrahim Kamel,et al. A Lightweight Data Integrity Scheme for Sensor Networks , 2011, Sensors.
[9] Gregory J. Pottie,et al. Wireless integrated network sensors (WINS) , 1999, Smart Structures.
[10] Sushil Jajodia,et al. Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..
[11] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[12] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[13] Xingming Sun,et al. Multi-mark: Multiple Watermarking Method for Privacy Data Protection in Wireless Sensor Networks , 2011 .
[14] Keqiu Li,et al. Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks , 2011, Comput. Commun..
[15] Ran Wolff,et al. In-Network Outlier Detection in Wireless Sensor Networks , 2006, ICDCS.
[16] Shen Derong. Digital Watermarking Technique Applied to Wireless Sensor Networks , 2009 .
[17] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[18] Xingming Sun,et al. Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks , 2013 .