Adaptive Security Modules in Incrementally Deployed Sensor Networks
暂无分享,去创建一个
[1] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[2] Alan F. Smeaton,et al. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..
[3] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[4] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[5] Mohamed F. Younis,et al. A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.
[6] Sugata Sanyal,et al. Security Scheme for Distributed DoS in Mobile Ad Hoc Networks , 2010, ArXiv.
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Aura Ganz,et al. Runtime security composition for sensor networks (SecureSense) , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[9] Ricardo Dahab,et al. On the design of secure protocols for hierarchical sensor networks , 2007, Int. J. Secur. Networks.
[10] Arthur L. Liestman,et al. CLUSTERING ALGORITHMS FOR AD HOC WIRELESS NETWORKS , 2004 .