Security architecture for wireless sensor networks using frequency hopping and public key management
暂无分享,去创建一个
[1] Mohamed F. Younis,et al. A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.
[2] Jianqing Ma,et al. Frequency-hopping based Secure Schemes in Sensornets , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).
[3] Steven D. Glaser,et al. Feasibility Analysis of Optimal Controller Design for Adaptive Channel Hopping , 2009 .
[4] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[5] Stephan Olariu,et al. Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.
[6] Kristofer S. J. Pister,et al. TSMP: TIME SYNCHRONIZED MESH PROTOCOL , 2008 .
[7] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[9] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[10] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[11] Ankur Mehta,et al. Reliability through frequency diversity: why channel hopping makes sense , 2009, PE-WASUN '09.
[12] Alan F. Smeaton,et al. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..
[13] M. Misson,et al. Medium access control for a tree-based wireless sensor network: Synchronization management , 2008, 2008 1st IFIP Wireless Days.
[14] Pascale Minet,et al. Node Coloring in a Wireless Sensor Network with Unidirectional Links and Topology Changes , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[15] Gérard Chalhoub,et al. MAC specifications for a WPAN allowing both energy saving and guaranteed delay - Part A: MaCARI: a synchronized tree-based MAC protocol , 2008, WSAN.
[16] Choong Seon Hong,et al. Feasibility of PKC in resource-constrained wireless sensor networks , 2008, 2008 11th International Conference on Computer and Information Technology.
[17] Tuan Dang,et al. OCARI: Optimization of communication for Ad hoc reliable industrial networks , 2008, 2008 6th IEEE International Conference on Industrial Informatics.
[18] Seog Chung Seo,et al. A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks , 2006, EUC Workshops.