MoBility-Assisted Detection Of The Replication attacks in mobile wireless sensor networks
暂无分享,去创建一个
[1] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[2] Mahmut T. Kandemir,et al. On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[3] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[4] Hannes Hartenstein,et al. Stochastic properties of the random waypoint mobility model: epoch length, direction distribution, and cell change rate , 2002, MSWiM '02.
[5] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[6] Erchin Serpedin,et al. A New Approach for Time Synchronization in Wireless Sensor Networks: Pairwise Broadcast Synchronization , 2008, IEEE Transactions on Wireless Communications.
[7] Paolo Santi,et al. The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[8] David Evans,et al. Localization for mobile sensor networks , 2004, MobiCom '04.
[9] Chun-Shien Lu,et al. Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[10] Saurabh Ganeriwal,et al. Timing-sync protocol for sensor networks , 2003, SenSys '03.
[11] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[12] Shigeng Zhang,et al. SecMCL: A Secure Monte Carlo Localization algorithm for mobile sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[13] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[14] Peng Ning,et al. Secure and resilient clock synchronization in wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[15] Peng Ning,et al. TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.
[16] Tracy Camp,et al. Stationary distributions for the random waypoint mobility model , 2004, IEEE Transactions on Mobile Computing.
[17] Cauligi S. Raghavendra,et al. Performance analysis of mobility-assisted routing , 2006, MobiHoc '06.
[18] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[19] Chunming Qiao,et al. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes , 2010, IEEE Transactions on Mobile Computing.
[20] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[21] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[22] Peng Ning,et al. ShortPK: A short-term public key scheme for broadcast authentication in sensor networks , 2009, TOSN.
[23] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.