Lightweight and effective detection scheme for node clone attack in wireless sensor networks
暂无分享,去创建一个
[1] A. Yasinsac,et al. Ad hoc network security: peer identification and authentication using signal properties , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[2] Patrick Robertson,et al. Pilot-symbol-aided channel estimation in time and frequency , 1997 .
[3] Geoffrey Ye Li,et al. Robust channel estimation for OFDM systems with rapid dispersive fading channels , 1998, IEEE Trans. Commun..
[4] P. Bello. Characterization of Randomly Time-Variant Linear Channels , 1963 .
[5] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[6] Guang Gong,et al. Physical layer assisted authentication for distributed ad hoc wireless sensor networks , 2010, IET Inf. Secur..
[7] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[8] Hong Wen,et al. Build-in wiretap channel I with feedback and LDPC codes , 2009, Journal of Communications and Networks.
[9] Erik G. Larsson,et al. Joint symbol timing and channel estimation for OFDM based WLANs , 2001, IEEE Communications Letters.
[10] Thomas F. La Porta,et al. SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[11] Mahmut T. Kandemir,et al. On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[12] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[13] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[14] John A. Stankovic,et al. A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.