Security in wireless sensor networks
暂无分享,去创建一个
Mukesh Singhal | James Royalty | Venkata C. Giruka | Srilekha Varanasi | M. Singhal | V. C. Giruka | J. Royalty | Srilekha Varanasi | Mukesh Singhal | James Royalty | Srilekha Varanasi
[1] B. R. Badrinath,et al. Routing on a curve , 2003, CCRV.
[2] Shivakant Mishra,et al. Enhancing Base Station Security in Wireless Sensor Networks , 2003 .
[3] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[5] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[6] Nael B. Abu-Ghazaleh,et al. A taxonomy of wireless micro-sensor network models , 2002, MOCO.
[7] Ingrid Verbauwhede,et al. The energy cost of secrets in ad-hoc networks , 2002 .
[8] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[9] Robert Tappan Morris,et al. Capacity of Ad Hoc wireless networks , 2001, MobiCom '01.
[10] Martina Zitterbart,et al. Security in Sensor Networks , 2010, it Inf. Technol..
[11] Jan M. Rabaey,et al. Data funneling: routing with aggregation and compression for wireless sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[12] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .
[13] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[14] Donggang Liu,et al. Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks , 2003 .
[15] Mike Chen,et al. Security and Deployment Issues in a Sensor Network , 2000 .
[16] Deborah Estrin,et al. Time synchronization for wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[17] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[18] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[19] Charles P. Pfleeger,et al. Security in computing , 1988 .
[20] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[21] P. Ning,et al. Multi-Level μ TESLA : A Broadcast Authentication System for Distributed Sensor Networks ∗ , 2003 .
[22] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[23] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[24] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[25] Gaurav S. Sukhatme,et al. Connecting the Physical World with Pervasive Networks , 2002, IEEE Pervasive Comput..
[26] H. Cam,et al. Energy efficient security protocol for wireless sensor networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[27] Sushil Jajodia,et al. Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.
[28] Anupam Joshi,et al. Secure sensor networks for perimeter protection , 2003, Comput. Networks.
[29] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[30] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[31] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .