A trust enhancement scheme for cluster-based wireless sensor networks
暂无分享,去创建一个
[1] Dharma P. Agrawal,et al. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.
[2] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[3] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[4] Muhammad Khurram Khan,et al. An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards , 2006, ISPEC.
[5] Wen Hu,et al. A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks , 2011, PM2HW2N '11.
[6] Javier Blesa,et al. A Security Scheme for Wireless Sensor Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[7] T. Wark,et al. Fleck - A platform for real-world outdoor sensor networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[8] Andrei V. Gurtov,et al. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications , 2014, Sensors.
[9] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[10] Christoph Krauß,et al. T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks , 2011, SecureComm.
[11] I. Valkova,et al. LOCALIZATION OF GHRELIN IN THE EPITHELIAL CELLS OF THE DUODENUM IN THE RAT , 2015 .
[12] Arun Kumar Sangaiah,et al. Survey on clustering in heterogeneous and homogeneous wireless sensor networks , 2017, The Journal of Supercomputing.
[13] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[14] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[15] Gang Chen,et al. Automatically constructing trusted cluster computing environment , 2009, The Journal of Supercomputing.
[16] Enzo Baccarelli,et al. P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks , 2017, The Journal of Supercomputing.
[17] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[18] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[19] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[20] Leendert van Doorn,et al. A Practical Guide to Trusted Computing , 2007 .
[21] Peter I. Corke,et al. secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.
[22] Seungmin Rho,et al. Multilayer cluster designing algorithm for lifetime improvement of wireless sensor networks , 2014, The Journal of Supercomputing.
[23] Li Qing,et al. Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks , 2006, Comput. Commun..
[24] Prasanta K. Jana,et al. A distributed algorithm for energy efficient and fault tolerant routing in wireless sensor networks , 2015, Wirel. Networks.
[25] Apostolis K. Salkintzis. Guest editorial - multimedia communications oiler satellites , 2001 .
[26] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[27] Sai Ji,et al. Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks , 2017, The Journal of Supercomputing.
[28] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[29] Prasanta K. Jana,et al. Energy Efficient Clustering and Routing Algorithms for Wireless Sensor Networks: GA Based Approach , 2015, Wireless Personal Communications.
[30] Mohsen Guizani,et al. PKC Based Broadcast Authentication using Signature Amortization for WSNs , 2012, IEEE Transactions on Wireless Communications.
[31] Ameer Ahmed Abbasi,et al. A survey on clustering algorithms for wireless sensor networks , 2007, Comput. Commun..
[32] Yanjiang Yang,et al. Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks , 2011, Secur. Commun. Networks.
[33] Azer Bestavros,et al. SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks , 2004 .
[34] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[35] Christoph Krauß,et al. Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques , 2007, ESAS.
[36] Janusz Furtak,et al. Securing transmissions between nodes of WSN using TPM , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).
[37] Sanghamitra Panda,et al. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2015 .
[38] Jaecheol Ryou,et al. ID-based sensor node authentication for multi-layer sensor networks , 2014, Journal of Communications and Networks.
[39] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[40] Manisha J Nene,et al. Chip-Based Key Distribution Technique for Security Enhancement in Hierarchical Wireless Sensors Networks , 2017, 2017 IEEE 7th International Advance Computing Conference (IACC).