VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Cross-Layer Analysis of Error Control in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[2] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[3] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[4] Rajashekhar C. Biradar,et al. A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[5] Mohamed Eltoweissy,et al. Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.
[6] Sungsoo Kim,et al. Low Energy Consumption Security Method for Protecting Information of Wireless Sensor Network , 2006, APWeb Workshops.
[7] Raheem A. Beyah,et al. Composite Event Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[8] Michele Zorzi,et al. Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Multihop Performance , 2003, IEEE Trans. Mob. Comput..
[9] Yong Guan,et al. A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[10] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[11] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[12] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[13] Raheem A. Beyah,et al. Designing Secure Protocols for Wireless Sensor Networks , 2008, WASA.
[14] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[15] Falko Dressler,et al. Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[16] Frank Mueller,et al. Encryption overhead in embedded systems and sensor network nodes: modeling and analysis , 2003, CASES '03.
[17] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[18] Christoph Krauß,et al. STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[19] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.
[20] Cristina Alcaraz,et al. A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes , 2007, Mob. Networks Appl..
[21] Miao Ma. Resilience of sink filtering scheme in wireless sensor networks , 2006, Comput. Commun..
[22] Yingshu Li,et al. Dynamic Energy-based Encoding and Filtering in Sensor Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.