Secure Distributed Cluster Formation in Wireless Sensor Networks
暂无分享,去创建一个
Peng Ning | Cliff Wang | Pai Peng | Kun Sun
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Anthony Ephremides,et al. The Design and Simulation of a Mobile Radio Network with Distributed Control , 1984, IEEE J. Sel. Areas Commun..
[3] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[4] P. Lincoln,et al. Byzantine Agreement with Authentication : Observations andApplications in Tolerating Hybrid and Link Faults , 1995 .
[5] Neil Immerman,et al. Leader election algorithms for wireless ad hoc networks , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[6] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[7] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[8] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[9] Ossama Younis,et al. Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach , 2004, IEEE INFOCOM 2004.
[10] Stefano Basagni,et al. Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).
[11] Ravi Prakash,et al. Max-min d-cluster formation in wireless ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[12] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[13] Predrag T. Tosic,et al. Maximal Clique Based Distributed Group Formation for Autonomous Agent Coalitions , 2004 .
[14] Mario Gerla,et al. Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..
[15] Mario Gerla,et al. Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.
[16] Adrian Perrig,et al. ACE: An Emergent Algorithm for Highly Uniform Cluster Formation , 2004, EWSN.
[17] Danny Dolev,et al. Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..
[18] Sajal K. Das,et al. WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.
[19] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[20] Hirotsugu Kakugawa,et al. A self-stabilizing algorithm for finding cliques in distributed systems , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..
[21] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[22] C. D. Young,et al. Clique activation multiple access (CAMA): a distributed heuristic for building wireless datagram networks , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).
[23] Edward J. Coyle,et al. An energy efficient hierarchical clustering algorithm for wireless sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[24] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[25] Dhiraj K. Pradhan,et al. A cluster-based approach for routing in dynamic networks , 1997, CCRV.
[26] R. Rajaraman,et al. An efficient distributed algorithm for constructing small dominating sets , 2002 .
[27] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[28] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[29] Lujun Jia,et al. An efficient distributed algorithm for constructing small dominating sets , 2002, Distributed Computing.
[30] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .