A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks
暂无分享,去创建一个
[1] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[2] Xin Zhang,et al. Packet-dropping adversary identification for data plane security , 2008, CoNEXT '08.
[3] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[4] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[5] David E. Culler,et al. Design of a wireless sensor network platform for detecting rare, random, and ephemeral events , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[6] Paul Barford,et al. Accurate and efficient SLA compliance monitoring , 2007, SIGCOMM '07.
[7] Saurabh Bagchi,et al. Efficient incremental code update for sensor networks , 2011, TOSN.
[8] Martina Zitterbart,et al. FleGSens - secure area monitoring using wireless sensor networks , 2009 .
[9] Issa M. Khalil,et al. SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[10] Christos Faloutsos,et al. Epidemic thresholds in real networks , 2008, TSEC.
[11] Wendi Heinzelman,et al. Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .
[12] Bruce H. Krogh,et al. Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.
[13] David Simplot-Ryl,et al. Energy-efficient area monitoring for sensor networks , 2004, Computer.
[14] Paul Barford,et al. Improving accuracy in end-to-end packet loss measurement , 2005, SIGCOMM '05.
[15] Tian He,et al. Differentiated surveillance for sensor networks , 2003, SenSys '03.
[16] Matthias Grossglauser,et al. Trajectory sampling for direct traffic observation , 2000, SIGCOMM 2000.
[17] SommersJoel,et al. Improving accuracy in end-to-end packet loss measurement , 2005 .
[18] Reza Curtmola,et al. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.
[19] Kameshwar Poolla,et al. Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).