Security Issues In Zigbee Networks
暂无分享,去创建一个
[1] Jelena V. Misic,et al. Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic , 2006, IEEE Transactions on Parallel and Distributed Systems.
[2] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[3] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[4] Gwo-Jia Jong,et al. The Wireless Sensor Network for Home-Care System Using ZigBee , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[5] Mohamed Eltoweissy,et al. Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.
[6] P. Venkata Krishna,et al. LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.
[7] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[8] Giannis F. Marias,et al. Integrating a Trust Framework with a Distributed Certificate Validation Scheme for MANETs , 2006, EURASIP J. Wirel. Commun. Netw..
[9] Mohammad S. Obaidat,et al. Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[10] Edgar H. Callaway,et al. Home networking with IEEE 802.15.4: a developing standard for low-rate wireless personal area networks , 2002, IEEE Commun. Mag..
[11] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[12] Mohammad S. Obaidat,et al. Attack Graph Generation with Infused Fuzzy Clustering , 2009, SECRYPT.
[13] Sheng Zhong,et al. Body sensor network security: an identity-based cryptography approach , 2008, WiSec '08.
[14] Hideki Imai,et al. Security in Wireless Communication , 2002, Wirel. Pers. Commun..
[15] Vijay Kumar,et al. Robot and sensor networks for first responders , 2004, IEEE Pervasive Computing.
[16] Mohammad S. Obaidat,et al. A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous Ad Hoc Sensor Networks and Its Simulation Analysis , 2008, Simul..
[17] Mazliza Othman. Principles of mobile computing and communications , 2007 .
[18] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[19] Li Zhang,et al. The Realization of Intelligent Home by ZigBee Wireless Network Technology , 2009, 2009 Pacific-Asia Conference on Circuits, Communications and Systems.
[20] Cristina Nita-Rotaru,et al. Secure group communication in wireless mesh networks , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[21] K. Malaric,et al. ZigBee wireless standard , 2006, Proceedings ELMAR 2006.
[22] Sudip Misra,et al. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..
[23] Mohammad S. Obaidat,et al. A Fuzzy logic-based Energy Efficient Packet Loss Preventive Routing Protocol , 2009, 2009 International Symposium on Performance Evaluation of Computer & Telecommunication Systems.
[24] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[25] Mohammad S. Obaidat,et al. An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks , 2009, Secur. Commun. Networks.
[26] Sudip Misra,et al. Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks , 2010, Comput. Electr. Eng..
[27] Athina P. Petropulu,et al. Energy-Efficient Channel Estimation in MIMO Systems , 2006 .
[28] Robin Kravets,et al. Composite key management for ad hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[29] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[30] Anand Raghunathan,et al. Securing wireless data: system architecture challenges , 2002, 15th International Symposium on System Synthesis, 2002..
[31] Prashant Krishnamurthy,et al. The interaction of security and survivability in hybrid wireless networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.