Securing Wireless Sensor Networks: Security Architectures
暂无分享,去创建一个
[1] Carlos F. García-Hernández,et al. Wireless Sensor Networks and Applications: a Survey , 2007 .
[2] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[3] T. Newe,et al. Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).
[4] Andrea Vitaletti,et al. Rijndael for Sensor Networks: Is Speed the Main Issue? , 2007, Electron. Notes Theor. Comput. Sci..
[5] Sanjay Kumar Madria,et al. Sensor networks: an overview , 2003 .
[6] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[7] Jens-Peter E Kaps,et al. Cryptography for Ultra-Low Power Devices , 2006 .
[8] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[9] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[10] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[11] Aleksandar Milenkovic,et al. Journal of Neuroengineering and Rehabilitation Open Access a Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation , 2005 .
[12] David E. Culler,et al. The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.
[13] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[14] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[15] Yang Xiao,et al. MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[16] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[17] Choong Seon Hong,et al. Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[18] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[19] Barry E. Mullins,et al. Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks , 2007, Int. J. Secur. Networks.
[20] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[21] Jakob Jonsson,et al. On the Security of CTR + CBC-MAC , 2002, Selected Areas in Cryptography.
[22] David E. Culler,et al. The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.
[23] Hiren Kumar Deva Sarma,et al. Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[24] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[25] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[26] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[27] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[28] David E. Culler,et al. System architecture for wireless sensor networks , 2003 .
[29] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[30] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[31] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[32] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[33] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[34] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[35] Archana Bharathidasan,et al. Sensor Networks : An Overview , 2002 .
[36] Sushil Jajodia,et al. Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[37] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[38] Jaein Jeong,et al. Design and analysis of micro-solar power systems for Wireless Sensor Networks , 2008, 2008 5th International Conference on Networked Sensing Systems.
[39] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.