Authentication and Anti-replay Security Protocol for Wireless Sensor Networks
暂无分享,去创建一个
Nicolae Tapus | Razvan Deaconescu | Laura Gheorghe | Razvan Rughinis | N. Tapus | R. Rughinis | L. Gheorghe | R. Deaconescu
[1] Jun Zheng,et al. Wireless Sensor Networks: A Networking Perspective , 2009 .
[2] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[3] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[4] David E. Culler,et al. TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.
[5] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[6] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[9] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[10] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[12] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.