Management and security of remote sensor networks in hazardous environments using over the air programming
暂无分享,去创建一个
[1] Limin Wang,et al. MNP: Multihop Network Reprogramming Service for Sensor Networks , 2004, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[2] David E. Culler,et al. The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.
[3] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[4] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[5] Prasun Sinha,et al. Sprinkler: a reliable and energy efficient data dissemination service for wireless embedded devices , 2005, 26th IEEE International Real-Time Systems Symposium (RTSS'05).
[6] David E. Culler,et al. Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[7] Renjie Huang,et al. TinyOS-based Quality of Service Management in Wireless Sensor Networks * , 2009 .
[8] Tarek Abdelzaher,et al. Proceedings of the 12th international conference on Information processing in sensor networks , 2013, IPSN 2013.
[9] Manik Lal Das,et al. Dynamic Program Update in Wireless Sensor Networks Using Orthogonality Principle , 2008, IEEE Communications Letters.
[10] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[11] John Zic,et al. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.
[12] Robbert van Renesse,et al. Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining , 2003, TOCS.
[13] David Starobinski,et al. Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[14] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[15] Wen-Zhan Song,et al. Optimized Autonomous Space In-situ Sensor-Web for Volcano Monitoring , 2008 .
[16] Renjie Huang,et al. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks , 2009, Pervasive Mob. Comput..
[17] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[18] David C. Pieri,et al. Optimized Autonomous Space - In-situ Sensorweb: A new Tool for Monitoring Restless Volcanoes , 2007 .
[19] M. Lynn. Hawaii International Conference on System Sciences , 1996 .
[20] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[21] Howon Kim,et al. Hash-based Secure Sensor Network Programming Method without Public Key Cryptography , 2006 .
[22] Dirk Westhoff,et al. A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme , 2009, WiSec '09.
[23] Wen-Zhan Song,et al. Over the Air Programming on Imote2-Based Sensor Networks , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[24] David E. Culler,et al. The firecracker protocol , 2004, EW 11.
[25] Deborah Estrin,et al. A Remote Code Update Mechanism for Wireless Sensor Networks , 2003 .
[26] Rajeev Gandhi,et al. Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.
[27] D. Pao,et al. Tree-based versus gossip-based reliable multicast in wireless ad hoc networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[28] Lane A. Phillips. Aqueduct: Robust and Ecient Code Propagation in Heterogeneous Wireless Sensor Networks , 2005 .
[29] Ben Y. Zhao,et al. The Ninja architecture for robust Internet-scale systems and services , 2001, Comput. Networks.
[30] Richard J. Spillman,et al. Classical and Contemporary Cryptology , 2004 .
[31] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[32] J. Deng,et al. Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[33] John Zic,et al. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2013, Comput. Secur..