Practical overview of security issues in wireless sensor network applications
暂无分享,去创建一个
Lei Pan | Sheng Wen | Harish Radhappa | James Xi Zheng | Lei Pan | Sheng Wen | Harish Radhappa | James Xi Zheng
[1] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[2] Ismail Mansour,et al. Key Management in Wireless Sensor Networks , 2015 .
[3] Wen Hu,et al. Springbrook: Challenges in developing a long-term, rainforest wireless sensor network , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[4] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[5] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.
[6] Insup Lee,et al. Quantifying eavesdropping vulnerability in sensor networks , 2005, DMSN '05.
[7] Guiling Wang,et al. Lightweight and Compromise-Resilient Message Authentication in Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[8] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[9] Kota Solomon Raju,et al. Implementation of a WSN system towards SHM of civil building structures , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).
[10] Emil C. Lupu,et al. Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..
[11] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.
[12] Samir Mustapha,et al. Advances in structural health monitoring system architecture , 2014 .
[13] Jr B. F. Spencer,et al. Structural Health Monitoring Using Smart Sensors , 2007 .
[14] Anthony Dick,et al. Towards intelligent networked video surveillance for the detection of suspicious behaviours , 2005 .
[15] Bo Li,et al. A survey of transport protocols for wireless sensor networks , 2006, IEEE Network.
[16] P. S. Jadhav,et al. Forest Fire Monitoring System Based On ZIG-BEE Wireless Sensor Network , 2012 .
[17] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[18] Neenu George,et al. Detection of Node Clones in Wireless Sensor Network Using Detection Protocols , 2014, ArXiv.
[19] Gulshan Kumar,et al. Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement , 2012 .
[20] Marimuthu Palaniswami,et al. Elliptical anomalies in wireless sensor networks , 2009, TOSN.
[21] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..
[22] Elisa Bertino,et al. Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.
[23] Mohd Fauzi Othman,et al. Wireless Sensor Network Applications: A Study in Environment Monitoring System , 2012 .
[24] Shamim N. Pakzad,et al. Distributed modal identification using restricted auto regressive models , 2011, Int. J. Syst. Sci..
[25] Chia-Mei Chen,et al. Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks , 2015, ICGEC.
[26] Peter I. Corke,et al. Environmental Wireless Sensor Networks , 2010, Proceedings of the IEEE.
[27] Mehrisadat Makki Alamdari,et al. Damage identification of a concrete arch beam based on frequency response functions and artificial neural networks , 2015 .
[28] Rawya Rizk,et al. Two-phase hybrid cryptography algorithm for wireless sensor networks , 2015 .
[29] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[30] R. venkatesh,et al. Independent Living For Persons with Disabilities and Elderly People Using Smart Home Technology , 2015 .
[31] Yunghsiang Sam Han,et al. A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.
[32] Ismail Mansour,et al. Key Management inWireless Sensor Networks , 2015, J. Sens. Actuator Networks.
[33] Weisong Shi,et al. Using Wireless Sensor Networks for Fire Rescue Applications: Requirements and Challenges , 2006, 2006 IEEE International Conference on Electro/Information Technology.
[34] Almir Davis,et al. A SURVEY OF WIRELESS SENSOR NETWORK ARCHITECTURES , 2012 .
[35] B SrivastavaMani,et al. Reputation-based framework for high integrity sensor networks , 2008 .
[36] Yunghsiang Sam Han,et al. A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).