Secure and reliable broadcasting in wireless sensor networks using multi-parent trees
暂无分享,去创建一个
[1] Elena Pagani,et al. Reliable broadcast in mobile multihop packet networks , 1997, MobiCom '97.
[2] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[3] Jean-Pierre Hubaux,et al. Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues , 2002, MobiCom '02.
[4] S. Buchegger,et al. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .
[5] Jie Wu,et al. Distributed Reputation-based Secure Localization in Sensor Networks , 2006 .
[6] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[7] Jie Wu,et al. Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .
[8] Avishai Wool. Key management for encrypted broadcast , 1998, CCS '98.
[9] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[10] Jie Wu,et al. A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[11] Charles E. Perkins,et al. IP Flooding in Ad hoc Mobile Networks , 2005 .
[12] Mahtab Seddigh,et al. Internal nodes based broadcasting in wireless networks , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[13] Jean-Yves Le Boudec,et al. Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[14] Mario Gerla,et al. EFFICIENT FLOODING IN AD HOC NETWORKS USING ON-DEMAND (PASSIVE) CLUSTER FORMATION , 2003 .
[15] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[16] Chong-kwon Kim,et al. Multicast tree construction and flooding in wireless ad hoc networks , 2000, MSWIM '00.
[17] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[18] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[19] Yu-Chee Tseng,et al. The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, Wirel. Networks.
[20] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[21] Chong-Kwon Kim,et al. Flooding in wireless ad hoc networks , 2001, Comput. Commun..
[22] Avishai Wool,et al. Key management for restricted multicast using broadcast encryption , 2000, TNET.
[23] Mahtab Seddigh,et al. Dominating Sets and Neighbor Elimination-Based Broadcasting Algorithms in Wireless Networks , 2002, IEEE Trans. Parallel Distributed Syst..
[24] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[25] Jie Wu,et al. On reducing broadcast redundancy in ad hoc wireless networks , 2002, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.