WIRELESS SENSOR NETWORKS - ARCHITECTURE , SECURITY REQUIREMENTS ,
暂无分享,去创建一个
[1] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[2] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[3] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[4] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[6] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[7] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[8] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[9] M.M. Alam,et al. An efficient routing protocol for mobile ad hoc networks with neighbor awareness and multicasting , 2004, E-Tech 2004.
[10] Srdjan Capkun,et al. Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .
[11] Özgür Erçetin,et al. SeFER: secure, flexible and efficient routing protocol for distributed sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[12] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[13] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[14] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[15] Rituparna Chaki,et al. A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network , 2011, ArXiv.
[16] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[17] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[18] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[19] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[20] Suho Park. Routing Security in Sensor Network: HELLO Flood Attack and Defense , 2005 .
[21] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[22] Zdravko Karakehayov. Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .
[23] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[24] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[25] Lalan Kumar,et al. A review on security issues in wireless sensor network , 2010 .
[26] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[27] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[28] B. Strulo,et al. Securing Mobile Ad hoc Networks — A Motivational Approach , 2003 .
[29] Subir Kumar Sarkar,et al. Issues in Wireless Sensor Networks , 2008 .