Protecting the Communication Structure in Sensor Networks
暂无分享,去创建一个
[1] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[2] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[3] Justine Cassell,et al. StoryMat: a play space for collaborative storytelling , 1999, CHI Extended Abstracts.
[4] Mark G. Terwilliger,et al. Overview of Sensor Networks , 2004 .
[5] N. Asokan,et al. Untraceability in mobile networks , 1995, MobiCom '95.
[6] G. Tsudik,et al. Authentication of mobile users , 1994, IEEE Network.
[7] Stefano Basagni,et al. A performance comparison of protocols for clustering and backbone formation in large scale ad hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[8] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[9] Deborah Estrin,et al. Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.
[10] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[11] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[12] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[13] Butler W. Lampson,et al. 31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .
[14] William J. Kaiser,et al. Methods for scalable self-assembly of ad hoc wireless sensor networks , 2004, IEEE Transactions on Mobile Computing.
[15] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[16] Ding-Zhu Du,et al. Improving Wireless Sensor Network Lifetime through Power Aware Organization , 2005, Wirel. Networks.
[17] Hannes Federrath,et al. Project “anonymity and unobservability in the Internet” , 2000, CFP '00.
[18] Gregory J. Pottie,et al. Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..
[19] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[20] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[21] Satish Kumar,et al. Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.
[22] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[23] V.V. Zhirnov,et al. New Frontiers: Self-Assembly and Nanoelectronics , 2001, Computer.
[24] Gabor Karsai,et al. Smart Dust: communicating with a cubic-millimeter computer , 2001 .
[25] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[26] Gaurav S. Sukhatme,et al. Connecting the Physical World with Pervasive Networks , 2002, IEEE Pervasive Comput..
[27] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.
[28] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[29] Sushil Jajodia,et al. Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.
[30] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[31] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[32] Stephan Olariu,et al. A simple and robust virtual infrastructure for massively deployed wireless sensor networks , 2005, Comput. Commun..
[33] R. Möhring. Algorithmic graph theory and perfect graphs , 1986 .
[34] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[35] Mani Srivastava,et al. Overview of sensor networks , 2004 .
[36] Stephan Olariu,et al. A unifying look at clustering in mobile ad hoc networks , 2004, Wirel. Commun. Mob. Comput..
[37] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[38] P. Ning,et al. Multi-Level μ TESLA : A Broadcast Authentication System for Distributed Sensor Networks ∗ , 2003 .
[39] Gabriel Montenegro,et al. Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.
[40] Adrian Perrig,et al. ACE: An Emergent Algorithm for Highly Uniform Cluster Formation , 2004, EWSN.
[41] Brian Neil Levine,et al. A protocol for anonymous communication over the Internet , 2000, CCS.
[42] Miodrag Potkonjak,et al. Smart kindergarten: sensor-based wireless networks for smart developmental problem-solving environments , 2001, MobiCom '01.
[43] Luiz A. DaSilva,et al. A service-centric model for wireless sensor networks , 2005, IEEE Journal on Selected Areas in Communications.
[44] Peter E. Sholander,et al. On the impact of alternate path routing for load balancing in mobile ad hoc networks , 2000, MobiHoc.
[45] Mani B. Srivastava,et al. Design of a wearable sensor badge for smart kindergarten , 2002, Proceedings. Sixth International Symposium on Wearable Computers,.
[46] Stephan Olariu,et al. On modeling wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[47] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[48] Tian He,et al. Differentiated surveillance for sensor networks , 2003, SenSys '03.
[49] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[50] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[51] Kevin A. Delin,et al. Sensor web: a new instrument concept , 2001, SPIE OPTO.
[52] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[53] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[54] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[55] Donggang Liu,et al. Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks , 2003 .
[56] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[57] Stephan Olariu,et al. Wireless sensor networks: leveraging the virtual infrastructure , 2004, IEEE Network.
[58] Stephan Olariu,et al. Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.
[59] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[60] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[61] Xiaoyan Hong,et al. An Anonymous On Demand Routing Protocol with Untraceable Routes for Mobile Ad-hoc Networks , 2003 .
[62] Paramvir Bahl,et al. PAWNs: Satisfying the need for ubiquitos secure connectivity and location services , 2002, IEEE Wireless Communications.
[63] 王艺明. Pawns: Satisfying the need for ubiquitous secure connectivity and location services , 2002 .
[64] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[65] K. Pister,et al. Instrumenting the physical world with pervasive networks , 2002 .
[66] Srdjan Capkun,et al. Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .
[67] Hugo Krawczyk,et al. Untraceable mobility or how to travel incognito , 1999, Comput. Networks.
[68] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[69] Paul Saffo,et al. Sensors: the next wave of innovation , 1997, CACM.
[70] John Anderson,et al. An analysis of a large scale habitat monitoring application , 2004, SenSys '04.
[71] Stephan Olariu,et al. Training a Wireless Sensor Network , 2005, Mob. Networks Appl..
[72] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[73] David E. Culler,et al. Analysis of wireless sensor networks for habitat monitoring , 2004 .
[74] Gaetano Borriello,et al. The flock: mote sensors sing in undergraduate curriculum , 2004, Computer.
[75] A. Ephremides,et al. A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.