Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks
暂无分享,去创建一个
[1] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[2] James Demmel,et al. Wireless sensor networks for structural health monitoring , 2006, SenSys '06.
[3] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[4] Felix C. Freiling,et al. Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.
[5] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[6] Tassos Dimitriou,et al. Authenticated In-Network Programming for Wireless Sensor Networks , 2006, ADHOC-NOW.
[7] David E. Culler,et al. The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.
[8] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[9] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[10] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[11] Vlado Handziski,et al. Flexible hardware abstraction of the TI MSP430 microcontroller in TinyOS , 2004, SenSys '04.
[12] Anthony D. Joseph. Sensor Networks, Wearable Computing, and Healthcare Applications , 2007 .
[13] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[14] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[15] Ian D. Henning,et al. Real World Issues in Deploying a Wireless Sensor Network , 2005 .
[16] Jesús Favela,et al. Sensor Networks, Wearable Computing, and Healthcare Applications , 2007, IEEE Pervasive Computing.
[17] Jingsha He,et al. Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..
[18] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[19] Stephen B. Wicker,et al. Transactional Confidentiality in Sensor Networks , 2008, IEEE Security & Privacy.