The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
暂无分享,去创建一个
[1] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[2] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[3] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[4] B. R. Badrinath,et al. I-TCP: indirect TCP for mobile hosts , 1995, Proceedings of 15th International Conference on Distributed Computing Systems.
[5] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[6] Rabi N. Mahapatra,et al. An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks , 2008, 2008 IEEE International Performance, Computing and Communications Conference.
[7] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[8] Deborah Estrin,et al. Intelligent fluid infrastructure for embedded networks , 2004, MobiSys '04.
[9] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[10] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[11] Anantha Chandrakasan,et al. Energy efficient protocols for low duty cycle wireless microsensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[12] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[13] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[14] M. Welsh,et al. Vital Signs Monitoring and Patient Tracking Over a Wireless Network , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[15] Saurabh Bagchi,et al. Efficient collection of sensor data in remote fields using mobile collectors , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).
[16] Dawn Song,et al. Key distribution techniques for sensor networks , 2004 .
[17] H. Chris Tseng,et al. Sinkhole intrusion indicators in DSR MANETs , 2004, First International Conference on Broadband Networks.
[18] Rabi N. Mahapatra,et al. A key pre-distribution scheme for heterogeneous sensor networks , 2009, IWCMC.
[19] G Coyle,et al. Home Telecare for the Elderly , 1995, Journal of telemedicine and telecare.
[20] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[21] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[22] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[23] A. Rasheed,et al. An Energy-Efficient Hybrid Data Collection Scheme in Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[24] Thomas F. La Porta,et al. Data Dissemination with Ring-Based Index for Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[25] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..