Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks
暂无分享,去创建一个
[1] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[2] Ricardo Dahab,et al. TinyTate: Identity-Based Encryption for Sensor Networks , 2007, IACR Cryptol. ePrint Arch..
[3] Venkata M. Mulpuru,et al. Detecting selective forwarding attacks in wireless sensor networks , 2008 .
[4] Deborah Estrin,et al. Residual Energy Scans for Monitoring Wireless Sensor Networks , 2002 .
[5] Deborah Estrin,et al. The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[6] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[7] Sandip Sen,et al. Using Learned Data Patterns to Detect Malicious Nodes in Sensor Networks , 2008, ICDCN.
[8] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .
[9] Yoon-Hwa Choi,et al. A secure alternate path routing in sensor networks , 2006, Comput. Commun..
[10] A. C. Viana,et al. Fighting Sinkhole Attacks in Tree-based Routing Topologies , 2009 .
[11] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[12] Ye Sun,et al. Power-efficient data dissemination in wireless sensor networks , 2003, MobiDe '03.
[13] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[14] Songwu Lu,et al. A scalable solution to minimum cost forwarding in large sensor networks , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).
[15] Feng Lu,et al. Research on Identity-Based Cluster Access Control Model with Dynamic Trust Agent for Mobile Ad Hoc Networks , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[16] Michael D. Smith,et al. Implementing public-key infrastructure for sensor networks , 2008, TOSN.
[17] Ricardo Dahab,et al. Identity-Based Encryption for Sensor Networks , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[18] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[19] K. J. Ray Liu,et al. Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[20] Edward W. Knightly,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[21] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[22] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[23] Deborah Estrin,et al. Sympathy for the sensor network debugger , 2005, SenSys '05.