Sensor wars: detecting and defending against spam attacks in wireless sensor networks
暂无分享,去创建一个
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] Vesa Karpijoki. Security in Ad Hoc Networks , 2001 .
[3] Kai Li,et al. A directionality based location discovery scheme for wireless sensor networks , 2002, WSNA '02.
[4] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[5] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[6] Mike Chen,et al. Security and Deployment Issues in a Sensor Network , 2000 .
[7] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[8] William Stallings,et al. Cryptography and network security , 1998 .
[9] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[10] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[11] Tarek F. Abdelzaher,et al. Energy-conserving data placement and asynchronous multicast in wireless sensor networks , 2003, MobiSys '03.
[12] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[13] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[14] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[15] Pietro Michiardi,et al. Security in ad hoc networks , 2003 .
[16] Mani B. Srivastava,et al. The bits and flops of the n-hop multilateration primitive for node localization problems , 2002, WSNA '02.
[17] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[18] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.