Securing sensor networks: A novel approach that combines encoding, uncorrelation and node disjoint transmission
暂无分享,去创建一个
Spyros Tragoudas | Themistoklis Haniotakis | Khadija Stewart | S. Tragoudas | T. Haniotakis | Khadija Stewart
[1] Nirwan Ansari,et al. 2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[2] Melvin A. Breuer,et al. Digital systems testing and testable design , 1990 .
[3] Eytan Modiano,et al. Finding Minimum Energy Disjoint Paths in Wireless Ad-Hoc Networks , 2005, Wirel. Networks.
[4] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[5] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[6] Laurie G. Cuthbert,et al. QoS in Node-Disjoint Routing for Ad Hoc Networks , 2008, Int. J. Commun. Netw. Syst. Sci..
[7] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[8] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[9] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[10] Laurie G. Cuthbert,et al. A reliable node-disjoint multipath routing with low overhead in wireless ad hoc networks , 2004, MSWiM '04.
[11] Eytan Modiano,et al. Minimum energy disjoint path routing in wireless ad-hoc networks , 2003, MobiCom '03.
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[14] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[15] Yair Frankel,et al. A Practical Protocol for Large Group Oriented Networks , 1990, EUROCRYPT.
[16] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[17] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[18] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[19] Jiang Hua,et al. Pair-Wise Key Pre-Distribution Scheme for Wireless Sensor Networks , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[20] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[21] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[22] Mansoor Alam,et al. Alleviating path correlation using directional antenna in node-disjoint multipath routing for mobile ad hoc networks , 2007, IWCMC.
[23] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[24] Evangelos Kranakis,et al. Directional Versus Omnidirectional Antennas for Energy Consumption and k-Connectivity of Networks of Sensors , 2004, OPODIS.
[25] Spyros Tragoudas,et al. Security enhancement through multiple path transmission in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[26] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[27] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.