An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks
暂无分享,去创建一个
[1] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[2] Jiming Chen,et al. A Communication Paradigm for Wireless Sensor/Actuator Networks , 2007, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007).
[3] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[4] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[5] Yu-Chee Tseng,et al. The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, Wirel. Networks.
[6] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[7] Radu Marculescu,et al. Real-Time Anonymous Routing for Mobile Ad Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[8] Mohan S. Kankanhalli,et al. Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[9] Ronggong Song,et al. AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks , 2005, SASN '05.
[10] Yang Xiao,et al. Security in Sensor Networks , 2006 .
[11] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[12] Cui Li,et al. Overview of Wireless Sensor Networks , 2005 .
[13] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[14] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[15] Azzedine Boukerche,et al. SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[16] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[17] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[18] David Gay,et al. Software design patterns for TinyOS , 2005, LCTES '05.
[19] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[20] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[21] Niki Pissinou,et al. Mobile and Wireless Network Security and Privacy , 2007 .
[22] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[23] Genshe Chen,et al. A decentralized approach to pursuer-evader games with multiple superior evaders , 2006, 2006 IEEE Intelligent Transportation Systems Conference.
[24] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[25] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[26] Ivan Stojmenovic,et al. Data-Centric Protocols for Wireless Sensor Networks , 2005, Handbook of Sensor Networks.
[27] Ian F. Akyildiz,et al. A survey on wireless mesh networks , 2005, IEEE Communications Magazine.
[28] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[29] Zhen Jiang,et al. Wireless and Sensor Networks Security (WSNS) A Retrospection , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[30] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[31] Jeff Rose,et al. Embedded Operating Systems for Wireless Microsensor Nodes , 2005, Handbook of Sensor Networks.
[32] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[33] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[34] Ivan Stojmenovic,et al. Handbook of Sensor Networks: Algorithms and Architectures , 2005, Handbook of Sensor Networks.
[35] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.