Threat Models and Security Issues in Wireless Sensor Networks
暂无分享,去创建一个
[1] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[2] Srdjan Capkun,et al. Secure time synchronization service for sensor networks , 2005, WiSe '05.
[3] Garimella Rama Murthy,et al. Distributed key management for wireless sensor networks , 2009, Q2SWinet '09.
[4] Ahmed Helmy,et al. Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.
[5] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[6] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[7] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[8] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[9] Xun Wang,et al. Sensor Network Configuration Under Physical Attacks , 2005, ICCNMC.
[10] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[12] Radha Poovendran,et al. Secure Broadcast in Energy-Aware Wireless Sensor Networks , 2002 .
[13] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[14] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[15] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[16] A. Zomaya,et al. A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..
[17] Adrian Perrig,et al. SAKE: Software attestation for key establishment in sensor networks , 2011, Ad Hoc Networks.
[18] Xun Wang,et al. Sensor network configuration under physical attacks , 2005, Int. J. Ad Hoc Ubiquitous Comput..
[19] Radha Poovendran,et al. Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[20] Pascal von Rickenbach,et al. Wireless Ad Hoc And sensor netWorks , 2007 .
[21] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[22] Bo Zhu,et al. Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN , 2009, ISA.
[23] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[24] Kalpana Sharma,et al. A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks , 2010 .
[25] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[26] Kalpana Sharma,et al. Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.
[27] Adrian Perrig,et al. The Coremelt Attack , 2009, ESORICS.
[28] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .