Random Key Pre-Distribution Techniques against Sybil Attacks
暂无分享,去创建一个
[1] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[2] Sugata Sanyal,et al. A Review of Techniques to Mitigate Sybil Attacks , 2012, ArXiv.
[3] Qiang Wang,et al. Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.
[4] Jubilant J. Kizhakkethottam,et al. A survey of techniques to prevent sybil attacks , 2015, 2015 International Conference on Soft-Computing and Networks Security (ICSNS).
[5] Mary Baker,et al. Preserving peer replicas by rate-limited sampled voting , 2003, SOSP '03.
[6] Aboul Ella Hassanien,et al. Key Pre-distribution Techniques for WSN Security Services , 2014, Bio-inspiring Cyber Security and Cloud Services.
[7] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[8] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[9] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[10] Panagiotis Papadimitratos,et al. Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.
[11] Mary Baker,et al. The LOCKSS peer-to-peer digital preservation system , 2005, TOCS.
[12] Tyler Moore,et al. Cooperative attack and defense in distributed networks , 2008 .
[13] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[14] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[15] Qingtao Wu,et al. A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks , 2013 .
[16] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[17] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[18] Jie Wu,et al. A Survey of Sybil Attacks in Networks , 2013 .
[19] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[20] Panagiotis Papadimitratos,et al. Towards provable secure neighbor discovery in wireless networks , 2008, FMSE '08.
[21] George Kesidis,et al. Robust Sybil Detection for MANETs , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[22] Panagiotis Papadimitratos,et al. Stealthy pre-attacks against random key pre-distribution security , 2012, 2012 IEEE International Conference on Communications (ICC).
[23] Logan Washbourne. A Survey of P2P Network Security , 2015, ArXiv.
[24] Chunling Cheng,et al. An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[25] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[26] Rupesh Gunturu,et al. Survey of Sybil Attacks in Social Networks , 2015, ArXiv.
[27] Christian Scheideler,et al. Group Spreading: A Protocol for Provably Secure Distributed Name Service , 2004, ICALP.