Distributed clone detection in wireless sensor networks: An optimization approach
暂无分享,去创建一个
Radha Poovendran | Linda Bushnell | Tamara Bonaci | Phillip Lee | L. Bushnell | R. Poovendran | Phillip Lee | Tamara Bonaci
[1] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[2] Sajal K. Das,et al. On the Energy Hole Problem of Nonuniform Node Distribution in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[3] Guang Gong,et al. Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[4] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[6] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[7] Xin Liu,et al. Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.
[8] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[9] Gui-Hai Chen,et al. The Energy Hole Problem of Nonuniform Node Distribution in Wireless Sensor Networks: The Energy Hole Problem of Nonuniform Node Distribution in Wireless Sensor Networks , 2009 .
[10] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[11] Radha Poovendran,et al. SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.