A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks
暂无分享,去创建一个
[1] Guohong Cao,et al. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[2] Ivan Stojmenovic,et al. Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.
[3] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[4] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[5] Yong Guan,et al. A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Qun Li,et al. Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.
[7] Joonsang Baek,et al. Identity-based threshold signature scheme from the bilinear pairings (extended abstract) , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[8] J. Baek,et al. Identity-based Threshold Signature from the Bilinear Pairings , 2004 .
[9] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[10] Michael Szydlo,et al. Merkle Tree Traversal in Log Space and Time , 2004, EUROCRYPT.
[11] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[12] Shanshan Li,et al. Estimation of a Population Size in Large-Scale Wireless Sensor Networks , 2009, Journal of Computer Science and Technology.
[13] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[14] Qun Li,et al. PDF: A Public-key based False Data Filtering Scheme in Sensor Networks , 2007, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007).
[15] Su Zhong,et al. Key Management Schemes and Protocols for Wireless Sensor Networks , 2007 .
[16] Thomas F. La Porta,et al. Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2006, IEEE Transactions on Mobile Computing.
[17] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[18] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[19] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[20] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.
[21] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[22] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[23] Miao Ma. Resilience of sink filtering scheme in wireless sensor networks , 2006, Comput. Commun..
[24] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[25] Brian D. O. Anderson,et al. Wireless sensor network localization techniques , 2007, Comput. Networks.
[26] Ming-Whei Feng. Wireless Sensor Network Industrial View? What Will Be the Killer Apps for Wireless Sensor Network? , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[27] Jianzhong Li,et al. Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks , 2009, IEEE INFOCOM 2009.
[28] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[29] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[30] S. Manesis,et al. A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..
[31] Songwu Lu,et al. Commutative cipher based en-route filtering in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[32] Erman Ayday,et al. Location-Aware Security Services for Wireless Sensor Networks Using Network Coding , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.