Improving Resilience Against Node Capture Attacks in Wireless Sensor Networks Using ICmetrics
暂无分享,去创建一个
[1] W. Gareth J. Howells,et al. Integrating Feature Values for Key Generation in an ICmetric System , 2009, 2009 NASA/ESA Conference on Adaptive Hardware and Systems.
[2] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[3] W. Gareth J. Howells,et al. Integrating Multi-Modal Circuit Features within an Efficient Encryption System , 2007, Third International Symposium on Information Assurance and Security.
[4] Dirk Westhoff,et al. Security Solutions for Wireless Sensor Networks , 2006 .
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] W. Gareth J. Howells,et al. Key Generation for Secure Inter-satellite Communication , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).
[7] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[8] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[9] W. Gareth J. Howells,et al. Ensuring Secure Healthcare Communications via ICmetric Based Encryption on Unseen Devices , 2009, 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security.
[10] A. Jain,et al. Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[11] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[12] Sandip Sen,et al. Comparing trust mechanisms for monitoring aggregator nodes in sensor networks , 2009, AAMAS.
[13] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[14] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[15] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[16] Jie Ling,et al. Certified Email Delivery with Offline TTP , 2007 .