CADS: Co-operative Anti-fraud Data Storage Scheme for Unattended Wireless Sensor Networks

[1]  Yong Guan,et al.  A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks , 2008, IEEE Transactions on Parallel and Distributed Systems.

[2]  Song Y. Yan,et al.  Computing Prime Factorization And Discrete Logarithms: From Index Calculus To Xedni Calculus , 2003, Int. J. Comput. Math..

[3]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[4]  Dali Wei,et al.  Rectangular Grids Design to Balance Power Consumption for Homogeneous Sensor Networks with High Node Density , 2007 .

[5]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Dirk Westhoff,et al.  Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .

[8]  Jingyu Hua,et al.  A Novel Ad hoc Routing Protocol Based on Mobility Prediction , 2008 .

[9]  Sanjay Kumar Madria,et al.  SeRWA: A secure routing protocol against wormhole attacks in sensor networks , 2009, Ad Hoc Networks.

[10]  Sencun Zhu,et al.  Attack-resilient time synchronization for wireless sensor networks , 2007, Ad Hoc Networks.

[11]  Claudio Soriente,et al.  Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks , 2009, Ad Hoc Networks.

[12]  Wensheng Zhang,et al.  Securing distributed data storage and retrieval in sensor networks , 2007, Pervasive Mob. Comput..