Vulnerabilities and Attacks in Wireless Sensor Networks
暂无分享,去创建一个
[1] Harald Vogt,et al. Exploring Message Authentication in Sensor Networks , 2004, ESAS.
[2] Ken Frazer,et al. Building secure software: how to avoid security problems the right way , 2002, SOEN.
[3] Harald Vogt,et al. Intrusion Detection and Failure Recovery in Sensor Nodes , 2005, GI Jahrestagung.
[4] Felix C. Freiling,et al. On the Feasibility and Meaning of Security in Sensor Networks , 2005 .
[5] Felix C. Freiling,et al. Simple Evasive Data Storage in Sensor Networks , 2005, IASTED PDCS.
[6] Jens Grossklags,et al. Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks , 2003, Mobile Data Management.
[7] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[8] Holger Peine. Rules of thumb for secure software engineering , 2005, ICSE.
[9] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[10] David LeBlanc,et al. Writing Secure Code , 2001 .
[11] Geoff Martin,et al. An Evaluation of Ad-hoc Routing Protocols for Wireless Sensor Networks , 2004 .
[12] Martina Zitterbart,et al. An efficient key establishment scheme for secure aggregating sensor networks , 2006, ASIACCS '06.
[13] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[14] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[15] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[16] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[17] Andrew Blyth,et al. Secure coding — principles and practices , 2004 .
[18] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[19] Kenneth R. van Wyk,et al. Secure Coding: Principles and Practices , 2003 .
[20] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[21] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[22] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[23] Tassos Dimitriou,et al. Secure and Efficient In-Network Processing for Sensor Networks , 2004 .
[24] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[25] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[26] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[27] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[28] M. Zitterbart,et al. A security-energy trade-off for authentic aggregation in sensor networks , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.
[29] Yongdae Kim,et al. Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.
[30] John Viega,et al. Secure programming cookbook for C and C , 2003 .
[31] Zinaida Benenson,et al. An algorithmic framework for robust access control in wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[32] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.