Energy cost analyses of key management techniques for secure patient monitoring in WSN
暂无分享,去创建一个
Mojib Majidi | Amir Hatami Hardoroudi | Rokhsareh Mobarhan | Abd Samad H-Ismail | Aidin Khodashenas Parchinaki
[1] T. Dimitriou,et al. Security issues in biomedical wireless sensor networks , 2008, 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies.
[2] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[3] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[4] Jelena Misic,et al. On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[5] M. Saraogi. SECURITY IN WIRELESS SENSOR NETWORKS , 2005 .
[6] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[7] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[8] Mohammed Feham,et al. Trust Key Management Scheme for Wireless Body Area Networks , 2011, Int. J. Netw. Secur..
[9] Anna Hać,et al. Wireless Sensor Network Designs , 2003 .
[10] H. S. Ng,et al. Security issues of wireless sensor networks in healthcare applications , 2006 .
[11] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[12] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[13] David Boyle,et al. Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.
[14] Vijay Varadharajan,et al. Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..
[15] Hiren Kumar Deva Sarma,et al. Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[16] Saurabh Singh,et al. Security For Wireless Sensor Network , 2011 .
[17] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[18] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[19] Mingbo Xiao,et al. Cross-Layer Design for the Security of Wireless Sensor Networks , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[20] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[21] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[22] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[23] Sushma,et al. Security Threats in Wireless Sensor Networks , 2011 .
[24] Carlo Snickars,et al. Design of a wirelessHART simulator for studying delay compensation in networked control systems , 2008 .
[25] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.