Search-based physical attacks in sensor networks
暂无分享,去创建一个
Xun Wang | Dong Xuan | Wei Yu | Sriram Chellappan | Wenjun Gu | Wei Yu | D. Xuan | Wenjun Gu | Xun Wang | Sriram Chellappan
[1] Seth J. Teller,et al. The cricket compass for context-aware mobile applications , 2001, MobiCom '01.
[2] Xun Wang,et al. Lifetime optimization of sensor networks under physical attacks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[3] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[4] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[5] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[6] Andrea C. Arpaci-Dusseau,et al. Fail-stutter fault tolerance , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[7] Swapnil Patil,et al. Performance measurement of ad-hoc sensor networks under threats , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[8] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] Yih-Chun Hu,et al. Wormhole Detection in Wireless Ad Hoc Networks , 2002 .
[10] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[11] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[12] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[13] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[14] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[15] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[16] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[17] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[18] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[19] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[20] Shivakant Mishra,et al. Enhancing Base Station Security in Wireless Sensor Networks , 2003 .
[21] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[22] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.