Security mechanism for maritime territory and frontier surveillance in naval operations using wireless sensor networks
暂无分享,去创建一个
[1] Muzzammil Hussain,et al. Underwater Wireless Sensor Networks , 2020, Handbook of Computer Networks and Cyber Security.
[2] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[3] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.
[4] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[5] Arne Lie,et al. Underwater Wireless Sensor Network , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.
[6] Kwangjo Kim,et al. Untraceable Mobile Node Authentication in WSN , 2010, Sensors.
[7] Gianluca Dini,et al. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network , 2012, Sensors.
[8] Paolo Casari,et al. Cooperative Authentication in Underwater Acoustic Sensor Networks , 2018, IEEE Transactions on Wireless Communications.
[9] Milica Stojanovic,et al. Underwater sensor networks: applications, advances and challenges , 2012, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[10] Muzzammil Hussain,et al. Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks , 2020, Int. J. Commun. Syst..
[11] Liang Xiao,et al. Learning-Based PHY-Layer Authentication for Underwater Sensor Networks , 2019, IEEE Communications Letters.
[12] Chiara Petrioli,et al. SecFUN: Security framework for underwater acoustic sensor networks , 2015, OCEANS 2015 - Genova.
[13] Dario Pompili,et al. Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.
[14] J. Kerr,et al. Robot operating systems: Bridging the gap between human and robot , 2012, Proceedings of the 2012 44th Southeastern Symposium on System Theory (SSST).
[15] M. Shamim Kaiser,et al. A novel algorithm for malicious attack detection in UWSN , 2015, 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT).
[16] Daqi Zhu,et al. A Cluster-Based Secure Synchronization Protocol for Underwater Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[17] Waqas Aman,et al. Impersonation Detection in Line-of-Sight Underwater Acoustic Sensor Networks , 2018, IEEE Access.
[18] Thomas Genet. SPAN+AVISPA for Verifying Cryptographic Protocols , 2017 .
[19] Shengli Zhou,et al. Aqua-Sim: An NS-2 based simulator for underwater sensor networks , 2009, OCEANS 2009.
[20] Soo-Hyun Park,et al. Ticket-based authentication protocol for Underwater Wireless Sensor Network , 2016, 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN).
[21] Ayaz Hassan Moon,et al. Implementation of Node Authentication for WSN Using Hash Chains , 2016 .
[22] Hari Om,et al. Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.
[23] Imad Mahgoub,et al. HIKES: Hierarchical key establishment scheme for wireless sensor networks , 2014, Int. J. Commun. Syst..
[24] Deying Li,et al. A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network , 2017, CWSN.
[25] Yuan Li,et al. Research challenges and applications for underwater sensor networking , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[26] Deying Li,et al. A Low Computational Complexity Authentication Scheme in Underwater Wireless Sensor Network , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).
[27] Ming Xu,et al. SenseVault: A Three-tier Framework for Securing Mobile Underwater Sensor Networks , 2018, IEEE Transactions on Mobile Computing.