A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
暂无分享,去创建一个
[1] Cristina Nita-Rotaru,et al. JANUS: towards robust and malicious resilient routing in hybrid wireless networks , 2004, WiSe '04.
[2] Songwu Lu,et al. GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks , 2005, Wirel. Networks.
[3] David E. Culler,et al. Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.
[4] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[5] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[6] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[7] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[8] Yoon-Hwa Choi,et al. A secure alternate path routing in sensor networks , 2006, Comput. Commun..
[9] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[10] Virgil D. Gligor,et al. Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion) , 2004, Security Protocols Workshop.
[11] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[12] Winston Khoon Guan Seah,et al. A priority-based multi-path routing protocol for sensor networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[13] Shivakant Mishra,et al. Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.
[14] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[15] Gang Zhou,et al. Impact of radio irregularity on wireless sensor networks , 2004, MobiSys '04.
[16] Issa M. Khalil,et al. DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[17] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[18] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[19] B. R. Badrinath,et al. ReInForM: reliable information forwarding using multiple paths in sensor networks , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..
[20] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[21] Yih-Chun Hu. Efficient Security Mechanisms for Routing Protocols , 2003 .
[22] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[23] Deborah Estrin,et al. Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .
[24] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[25] Xiaoyan Hong,et al. Load balanced, energy-aware communications for Mars sensor networks , 2002, Proceedings, IEEE Aerospace Conference.
[26] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[27] Guohong Cao,et al. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[28] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[29] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[30] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[31] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[32] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[33] Bruce H. Krogh,et al. Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.
[34] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[35] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[36] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[37] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[38] Di Tian,et al. Energy efficient routing with guaranteed delivery in wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[39] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[40] Yih-Chun Hu,et al. Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.
[41] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[42] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[43] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[44] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[45] Dawn Song,et al. SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..
[46] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.