Securing Topology Maintenance Protocols for Sensor Networks
暂无分享,去创建一个
Sushil Jajodia | Luigi V. Mancini | Sanjeev Setia | Andrea Gabrielli | S. Jajodia | L. Mancini | Sanjeev Setia | A. Gabrielli
[1] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[2] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[3] Robert Tappan Morris,et al. Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.
[4] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[5] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[6] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[7] Deborah Estrin,et al. Energy conservation by adaptive clustering for ad-hoc networks , 2002 .
[8] Injong Rhee,et al. Z-MAC: a hybrid MAC for wireless sensor networks , 2005, SenSys '05.
[9] Guoliang Xing,et al. Integrated coverage and connectivity configuration in wireless sensor networks , 2003, SenSys '03.
[10] Sushil Jajodia,et al. Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures , 2005 .
[11] Rami Mochaourab,et al. A fair and energy-efficient topology control protocol for wireless sensor networks , 2008, CASEMANS '08.
[12] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[13] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[14] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[15] Koen Langendoen,et al. Efficient broadcasting protocols for regular wireless sensor networks , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..
[16] Issa M. Khalil,et al. SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[17] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[18] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[19] Paolo Santi. Topology control in wireless ad hoc and sensor networks , 2005 .
[20] Yu Wang,et al. Energy-efficient topology control for three-dimensional sensor networks , 2008, Int. J. Sens. Networks.
[21] Songwu Lu,et al. PEAS: a robust energy conserving protocol for long-lived sensor networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[22] Deborah Estrin,et al. Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks , 2000 .
[23] Eyuphan Bulut,et al. DSSP: A Dynamic Sleep Scheduling Protocol for Prolonging the Lifetime of Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[24] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003 .
[25] Moustafa Youssef,et al. Energy-Aware TDMA-Based MAC for Sensor Networks , 2002 .
[26] Songwu Lu,et al. A Robust Data Delivery Protocol for Large Scale Sensor Networks , 2003, IPSN.
[27] Deborah Estrin,et al. ASCENT: adaptive self-configuring sensor networks topologies , 2004, IEEE Transactions on Mobile Computing.
[28] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[29] Roberto Di Pietro,et al. Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks , 2006, Wirel. Networks.
[30] Li Zhigang,et al. HETCP: A Hierachical Energy Efficient Topology Control Protocol for Wireless Sensor Networks , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[31] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[32] G. Anastasi,et al. How to Prolong the Lifetime of Wireless Sensor Networks , 2006 .
[33] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.