Attack-resilient hierarchical data aggregation in sensor networks
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[2] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[3] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[4] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[5] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[6] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[7] Jeffrey Considine,et al. Approximate aggregation techniques for sensor databases , 2004, Proceedings. 20th International Conference on Data Engineering.
[8] Deborah Estrin,et al. Computing aggregates for monitoring wireless sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[9] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[10] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[11] Dawn Song,et al. SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..
[12] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[13] Yong Yao,et al. The cougar approach to in-network query processing in sensor networks , 2002, SGMD.
[14] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[15] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[16] Miodrag Potkonjak,et al. Fault Tolerance in Wireless Ad-Hoc Sensor Networks , 2007 .
[17] Guohong Cao,et al. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[18] Ramesh Govindan,et al. Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.
[19] Philippe Flajolet,et al. Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..
[20] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[21] Suman Nath,et al. Tributaries and deltas: efficient and robust aggregation in sensor network streams , 2005, SIGMOD '05.
[22] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[23] Srinivasan Seshan,et al. Synopsis diffusion for robust aggregation in sensor networks , 2004, SenSys '04.
[24] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[25] Levente Buttyán,et al. Resilient aggregation with attack detection in sensor networks , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[26] Márk Jelasity,et al. Gossip-based aggregation in large dynamic networks , 2005, TOCS.