Wireless Sensor Network Security: PHY-Layer Security
暂无分享,去创建一个
Juan Hernández-Serrano | Dominique Barthel | Andrea Bartoli | Mischa Dohler | Miquel Soriano | Apostolos Kountouris
[1] Aamir Saeed Malik,et al. Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): a comprehensive overview , 2011, Eur. Trans. Telecommun..
[2] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[3] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[4] Min-Shiang Hwang,et al. On the security of an enhanced UMTS authentication and key agreement protocol , 2011, Eur. Trans. Telecommun..
[5] Makhlouf Aliouat,et al. Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks , 2012, Trans. Emerg. Telecommun. Technol..
[6] Theodore B. Zahariadis,et al. Mobile Networks Trust management in wireless sensor networks , 2010, Eur. Trans. Telecommun..
[7] Victor C. M. Leung,et al. Combating channel eviction triggering denial-of-service attacks in cognitive radio networks , 2012, Trans. Emerg. Telecommun. Technol..
[8] Jianfeng Ma,et al. Vulnerability analysis of elliptic curve cryptography‐based RFID authentication protocols , 2012, Trans. Emerg. Telecommun. Technol..
[9] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[10] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[11] Reinhard German,et al. Towards IEEE 802.15.4e: A study of performance aspects , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[12] Zubair A. Baig. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks , 2011, Comput. Commun..
[13] Miguel Soriano,et al. Secure Lossless Aggregation Over Fading and Shadowing Channels for Smart Grid M2M Networks , 2011, IEEE Transactions on Smart Grid.
[14] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).