A SURVEY OF REPROGRAMMING SECURITY IN WIRELESS SENSOR NETWORK
暂无分享,去创建一个
Daojing He | Farooq Ahmad | Depeng Chen | Daojing He | F. Ahmad | D. Chen
[1] Peng Ning,et al. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[2] Chun Chen,et al. DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks , 2012, IEEE Transactions on Wireless Communications.
[3] Peng Ning,et al. Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.
[4] David Starobinski,et al. Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[5] Wendi B. Heinzelman,et al. Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.
[6] Rui Zhang,et al. LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems.
[7] Ning Cai,et al. Theory of Secure Network Coding , 2011, Proceedings of the IEEE.
[8] Limin Wang,et al. Energy-efficient multihop reprogramming for sensor networks , 2009, TOSN.
[9] Baochun Li,et al. Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[10] Dongbing Gu,et al. Resilience against brute force and rainbow table attacks using strong ICMetrics session key pairs , 2013, 2013 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA).
[11] Limin Wang,et al. MNP: Multihop Network Reprogramming Service for Sensor Networks , 2004, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[12] Qiang Wang,et al. Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.
[13] David E. Culler,et al. The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.
[14] Tarek F. Abdelzaher,et al. Energy-conserving data cache placement in sensor networks , 2005, TOSN.
[15] Tracey Ho,et al. Resilient Network Coding in the Presence of Byzantine Adversaries , 2007, INFOCOM.
[16] Michele Zorzi,et al. SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes , 2010, IEEE Transactions on Mobile Computing.
[17] Zeng Yong,et al. Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.
[18] Xuemin Shen,et al. An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.
[19] Lawrence Charles Paulson,et al. Isabelle/HOL: A Proof Assistant for Higher-Order Logic , 2002 .
[20] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[21] Levente Buttyán,et al. SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains , 2013, 2013 IEEE International Conference on Communications (ICC).
[22] Dhananjay Kumar,et al. Rainbow table to crack password using MD5 hashing algorithm , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.
[23] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[24] Svetlana Peltsverger,et al. The security of cryptographic hashes , 2011, ACM-SE '11.
[25] Mohsen Guizani,et al. Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.
[26] Wolfgang Effelsberg,et al. Energy-Efficient Data Dissemination for Wireless Sensor Networks , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[27] Peng Ning,et al. Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[28] Gang Liu,et al. Low-overhead authentication method for reprogramming protocol based on rateless codes in wireless sensor networks , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[29] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[30] Indranil Gupta,et al. AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[31] Jan Bauer,et al. Selective and Secure Over-The-Air Programming for Wireless Sensor Networks , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[32] Oguzhan Kara,et al. Preimages of hash functions through rainbow tables , 2009, 2009 24th International Symposium on Computer and Information Sciences.
[33] Diana Berbecaru,et al. On the Performance and Use of a Space-Efficient Merkle Tree Traversal Algorithm in Real-Time Applications for Wireless and Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[34] Jianlong Tan,et al. Secure Network Coding with a Cost Criterion , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.
[35] Seung-Woo Seo,et al. Optimized Hash Tree for Authentication in Sensor Networks , 2007, IEEE Communications Letters.
[36] Chun Chen,et al. SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2012, IEEE Transactions on Industrial Electronics.
[37] S. Kim,et al. Trio: enabling sustainable and scalable outdoor wireless sensor network deployments , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[38] Georges Gonthier. A computer-checked proof of the Four Colour Theorem , 2005 .
[39] Shuo-Yen Robert Li,et al. Linear network coding , 2003, IEEE Trans. Inf. Theory.
[40] Christine Paulin-Mohring,et al. The Coq Proof Assistant : A Tutorial : Version 7.2 , 1997 .
[41] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[42] Christine Paulin-Mohring,et al. The Coq Proof Assistant A Tutorial , 2005 .
[43] Daojing He,et al. Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks , 2014, IEEE Journal of Biomedical and Health Informatics.
[44] Raheem A. Beyah,et al. SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[45] Lin Wu,et al. A DoS-resilient enhanced two-factor user authentication scheme in wireless sensor networks , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[46] G. Edward Suh,et al. Caches and hash trees for efficient memory integrity verification , 2003, The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings..
[47] Sanjay Jha,et al. Confidential and Secure Broadcast in Wireless Sensor Networks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[48] Mohsen Guizani,et al. Small data dissemination for wireless sensor networks: The security aspect , 2014, IEEE Wireless Communications.
[49] Rajeev Gandhi,et al. Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.
[50] Michele Zorzi,et al. SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[51] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[52] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[53] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[54] Ma Jian-feng,et al. An Access Control Scheme in Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[55] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[56] Johannes A. Buchmann,et al. CMSS - An Improved Merkle Signature Scheme , 2006, INDOCRYPT.