Report Dropping and Tampering Detection in Sensor Networks: Enhancing Data Reliability
暂无分享,去创建一个
[1] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[2] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[3] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[4] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] John Heidemann,et al. RMST: reliable data transport in sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[6] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[7] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[8] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[9] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[10] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[11] Sencun Zhu,et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.
[12] Özgür B. Akan,et al. ESRT: event-to-sink reliable transport in wireless sensor networks , 2003, MobiHoc '03.
[13] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[14] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[15] Wendi B. Heinzelman,et al. Application-specific protocol architectures for wireless networks , 2000 .
[16] Chieh-Yih Wan,et al. PSFQ: a reliable transport protocol for wireless sensor networks , 2002, WSNA '02.
[17] Issa M. Khalil,et al. DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[18] Ronitt Rubinfeld,et al. Fast approximate PCPs , 1999, STOC '99.
[19] Mark A. Shayman,et al. Energy Efficient Routing in Wireless Sensor Networks , 2003 .
[20] B. R. Badrinath,et al. Information assurance in sensor networks , 2003, WSNA '03.
[21] S. Khuller,et al. Approximation algorithms for partial covering problems , 2001, J. Algorithms.
[22] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[23] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[24] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[25] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[26] John S. Heidemann,et al. BARD: Bayesian-assisted resource discovery in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[27] Donggang Liu,et al. Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.
[28] J. J. Garcia-Luna-Aceves,et al. Reliable data delivery in event-driven wireless sensor networks , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[29] B. R. Badrinath,et al. ReInForM: reliable information forwarding using multiple paths in sensor networks , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..
[30] Vishal Anand,et al. SAWAN: a survivable architecture for wireless LANs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).
[31] Deborah Estrin,et al. Rumor Routing Algorithm For Sensor Networks , 2002 .
[32] Laurie G. Cuthbert,et al. Node-disjointness-based multipath routing for mobile ad hoc networks , 2004, PE-WASUN '04.
[33] Deborah Estrin,et al. Modelling Data-Centric Routing in Wireless Sensor Networks , 2002 .
[34] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[35] Cauligi S. Raghavendra,et al. PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.
[36] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[37] Ronitt Rubinfeld,et al. Spot-checkers , 1998, STOC '98.
[38] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..