Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs
暂无分享,去创建一个
[1] T. C. Maxino,et al. The Effectiveness of Checksums for Embedded Control Networks , 2009, IEEE Transactions on Dependable and Secure Computing.
[2] Joaquín Olivares,et al. Data Communication Optimization for the Evaluation of Multivariate Conditions in Distributed Scenarios , 2019, IEEE Access.
[3] Kyoung Soo Bok,et al. An Energy-Efficient Secure Scheme in Wireless Sensor Networks , 2016, J. Sensors.
[4] Martin Hell,et al. Electromagnetic Side-Channel Attack on AES using Low-end Equipment , 2020 .
[5] Alex Koohang,et al. The Internet of Things: Review and theoretical framework , 2019, Expert Syst. Appl..
[6] Guanglin Li,et al. Medical Information Security for Wearable Body Sensor Networks in Smart Healthcare , 2019, IEEE Consumer Electronics Magazine.
[7] Geovandro C. C. F. Pereira,et al. Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems , 2017, Secur. Commun. Networks.
[8] Julio Barbancho,et al. Securing a wireless sensor network for human tracking: a review of solutions , 2014, Int. J. Commun. Syst..
[9] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[10] MinierMarine,et al. Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller , 2015 .
[11] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[12] Mario Gerla,et al. Measuring effective capacity of IEEE 802.15.4 beaconless mode , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[13] Murat Dener,et al. TeenySec: a new data link layer security protocol for WSNs , 2016, Secur. Commun. Networks.
[14] Qiong Zhang,et al. Improve security of wireless sensor networks through reluctant checksum , 2017, Int. J. Distributed Sens. Networks.
[15] Youngho Cho,et al. An Enhanced Trust Mechanism with Consensus-Based False Information Filtering Algorithm against Bad-Mouthing Attacks and False-Praise Attacks in WSNs , 2019, Electronics.
[16] Abdelkamel Tari,et al. Lightweight Sharing Scheme for Data Integrity Protection in WSNs , 2016, Wirel. Pers. Commun..
[17] Selçuk Baktir,et al. Implementing RSA for Wireless Sensor Nodes , 2019, Sensors.
[18] Ibrahim Kamel,et al. A Lightweight Data Integrity Scheme for Sensor Networks , 2011, Sensors.
[19] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[20] David A. Wagner,et al. On the Structure of Skipjack , 2001, Discret. Appl. Math..
[21] P. Vasudeva Reddy,et al. Efficient and Secure Pairing-Free Certificateless Aggregate Signature Scheme for Healthcare Wireless Medical Sensor Networks , 2019, IEEE Internet of Things Journal.
[22] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[23] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[24] Ingrid Moerman,et al. Throughput and Delay Analysis of Unslotted IEEE 802.15.4 , 2006, J. Networks.
[25] Chao Liu,et al. A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT , 2017, Secur. Commun. Networks.
[26] Joaquín Olivares Bueno,et al. D2R-TED: Data-Domain Reduction Model for Threshold-Based Event Detection in Sensor Networks. , 2018 .