Defense against lap-top class attacker in wireless sensor network
暂无分享,去创建一个
[1] Vinayak S. Naik,et al. A line in the sand: a wireless sensor network for target detection, classification, and tracking , 2004, Comput. Networks.
[2] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[3] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.
[4] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[5] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[6] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[7] Sushil Jajodia,et al. Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.
[8] Anish Arora,et al. Secret instantiation in ad-hoc networks , 2006, Comput. Commun..
[9] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.
[10] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.