A Survey on Security in Wireless Sensor Networks
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[2] Robert Tappan Morris,et al. Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.
[3] Satyajit Banerjee,et al. Symmetric key based authenticated querying in wireless sensor networks , 2006, InterSense '06.
[4] Sajal K. Das,et al. Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[5] Kuang-Ching Wang,et al. Value-Fusion versus Decision-Fusion for Fault-tolerance in Collaborative Target Detection in Sensor Networks , 2001 .
[6] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[7] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[8] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[9] Issa M. Khalil,et al. DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[10] Jie Wu,et al. Fault-Tolerant Topology Control for Heterogeneous Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[11] Jessica Staddon,et al. Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.
[12] Yurong Xu,et al. Providing Anonymity in Wireless Sensor Networks , 2007, IEEE International Conference on Pervasive Services.
[13] Mohamed Eltoweissy,et al. Combinatorial optimization of multicast key management , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[14] Saswati Sarkar,et al. On optimal placement of intrusion detection modules in sensor networks , 2004, First International Conference on Broadband Networks.
[15] H.E. Michel,et al. Integrated modeling for wireless sensor networks reliability and security , 2006, RAMS '06. Annual Reliability and Maintainability Symposium, 2006..
[16] M. Potkonjak,et al. Fault tolerance techniques for wireless ad hoc sensor networks , 2002, Proceedings of IEEE Sensors.
[17] Hannes Hartenstein,et al. Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers , 2005, ESAS.
[18] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[19] Felix C. Freiling,et al. Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .
[20] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[21] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[22] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[23] Satyajayant Misra,et al. Efficient anonymity schemes for clustered wireless sensor networks , 2006, Int. J. Sens. Networks.
[24] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[25] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[26] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[27] Bao Li,et al. An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[28] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[29] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[30] Ali Miri,et al. An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[31] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[32] Yuguang Fang,et al. MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.
[33] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[34] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[35] Ali Miri,et al. A real-time node-based traffic anomaly detection algorithm for wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).
[36] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[37] Mohamed Eltoweissy,et al. Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.
[38] Bruno Dutertre,et al. Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .
[39] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.
[40] Satyajayant Misra,et al. Fault-Tolerant Relay Node Placement in Wireless Sensor Networks: Problems and Algorithms , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[41] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[42] Liudong Xing,et al. Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[43] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[44] Antonio Alfredo Ferreira Loureiro,et al. MANNA: a management architecture for wireless sensor networks , 2003, IEEE Commun. Mag..
[45] Xiang-Yang Li,et al. Asymptotic distribution of the number of isolated nodes in wireless ad hoc networks with Bernoulli nodes , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[46] Peng Ning,et al. Fault-tolerant cluster-wise clock synchronization for wireless sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[47] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[48] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[49] Parameswaran Ramanathan,et al. Fault tolerance in collaborative sensor networks for target detection , 2004, IEEE Transactions on Computers.
[50] Tingting Zhang,et al. Detecting Anomaly Node Behavior in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[51] S.K. Ghosh,et al. Distributed fault tolerant topology control in wireless ad-hoc sensor networks , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.
[52] Abdel Aitouche,et al. Sensor network design for fault tolerant estimation , 2004 .
[53] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[54] S. Sitharama Iyengar,et al. Efficient and Fault-Tolerant Feature Extraction in Wireless Sensor Networks , 2003, IPSN.
[55] Kirk Martinez,et al. Environmental sensor networks , 2004, Computer.
[56] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[57] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[58] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[59] Nael B. Abu-Ghazaleh,et al. An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.
[60] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[61] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[62] Yunghsiang Sam Han,et al. A combined decision fusion and channel coding scheme for distributed fault-tolerant classification in wireless sensor networks , 2006, IEEE Transactions on Wireless Communications.
[63] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[64] P. Djukic,et al. Minimum energy fault tolerant sensor networks , 2004, IEEE Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004..
[65] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[66] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[67] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[68] Tingting Zhang,et al. Sec-SNMP: Policy-based Security Management for Sensor Networks , 2008, SECRYPT.
[69] Abdel Aitouche,et al. Optimal design of fault tolerant sensor networks , 2000, Proceedings of the 2000. IEEE International Conference on Control Applications. Conference Proceedings (Cat. No.00CH37162).