Node capture attack detection and defence in wireless sensor networks
暂无分享,去创建一个
[1] Eylem Ekici,et al. Secure probabilistic location verification in randomly deployed wireless sensor networks , 2008, Ad Hoc Networks.
[2] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[3] Srdjan Capkun,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.
[4] Hamid Sharif,et al. Image transmissions with security enhancement based on region and path diversity in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[5] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[6] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[7] Suman Banerjee,et al. Towards Secure Localization Using Wireless "Congruity' , 2007, Eighth IEEE Workshop on Mobile Computing Systems and Applications.
[8] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[9] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[10] Eui-nam Huh,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.
[11] Ovidiu Banias,et al. Combined Malicious Node Discovery and Self-Destruction Technique for Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.
[12] Radha Poovendran,et al. HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[13] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[14] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[15] Yuguang Fang,et al. Securing sensor networks with location-based keys , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[16] Karl Aberer,et al. Possibilities for Managing Trust in P2P Networks (EPFL Technical Report IC/2004/84) , 2004 .
[17] Kang G. Shin,et al. LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.
[18] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[19] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[20] Sang Ho Lee,et al. Secure Key Management Protocol in the Wireless Sensor Network , 2006, J. Inf. Process. Syst..
[21] Wesley E. Snyder,et al. A New Relaxation Labeling Architecture for Secure Localization in Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[22] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[23] Harald Vogt,et al. Integrity preservation for communication in sensor networks , 2004 .
[24] Daniel Curiac,et al. Energy-driven methodology for node self-destruction in wireless sensor networks , 2009, 2009 5th International Symposium on Applied Computational Intelligence and Informatics.
[25] Srdjan Capkun,et al. SecNav: secure broadcast localization and time synchronization in wireless networks , 2007, MobiCom '07.
[26] Khaled Elleithy,et al. Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications , 2007 .