Dynamic Authentication-Key Re-assignment for Reliable Report Delivery
暂无分享,去创建一个
[1] Songwu Lu,et al. GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks , 2005, Wirel. Networks.
[2] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[3] Eytan Modiano,et al. Minimum energy disjoint path routing in wireless ad-hoc networks , 2003, MobiCom '03.
[4] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[5] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[6] Chunming Qiao,et al. Meshed multipath routing with selective forwarding: an efficient strategy in wireless sensor networks , 2003, Comput. Networks.
[7] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[8] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[9] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[10] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[11] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[12] Guohong Cao,et al. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[13] Ossama Younis,et al. Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach , 2004, IEEE INFOCOM 2004.
[14] Haiyun Luo,et al. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.
[15] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.