Proposing a Novel Algorithm to Improve Security in Wireless Sensor Networks Using Data Coding
暂无分享,去创建一个
[1] Panagiotis Papadimitratos,et al. Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.
[2] Wouter Joosen,et al. Using Security Patterns to Combine Security Metrics , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[3] S. Wicker. Error Control Systems for Digital Communication and Storage , 1994 .
[4] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[5] Zygmunt J. Haas,et al. Analysis of multipath Routing-Part I: the effect on the packet delivery ratio , 2004, IEEE Transactions on Wireless Communications.
[6] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[7] Viktor K. Prasanna,et al. The Abstract Task Graph: a methodology for architecture-independent programming of networked sensor systems , 2005, EESR '05.
[8] Kevin M. Stine,et al. SP 800-55 Rev. 1. Performance Measurement Guide for Information Security , 2008 .
[9] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[10] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[11] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[12] Kevin M. Stine,et al. Performance Measurement Guide for Information Security , 2008 .
[13] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[14] Yuichi Sei,et al. Security software engineering in wireless sensor networks , 2008 .
[15] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[16] Cecilia Mascolo,et al. The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[17] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).