Research on secure data collection in wireless multimedia sensor networks
暂无分享,去创建一个
Xiaofei Wang | Heung-Gyoon Ryu | Xiaohu Ge | Chunsheng Zhu | Kai Lin | Xiaofei Wang | Xiaohu Ge | H. Ryu | Kai Lin | Chunsheng Zhu
[1] Fang Liu,et al. WSN09-2: On the Performance of In-Situ Key Establishment Schemes for Wireless Sensor Networks , 2006, IEEE Globecom 2006.
[2] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[3] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[4] Ming Dong,et al. On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.
[5] NingPeng,et al. How to misuse AODV , 2005 .
[6] Sisi Liu,et al. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2009, IEEE INFOCOM 2009.
[7] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[8] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[9] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[10] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[11] Victor C. M. Leung,et al. Directional geographical routing for real-time video communications in wireless sensor networks , 2007, Comput. Commun..
[12] R. F.,et al. Mathematical Statistics , 1944, Nature.
[13] Victor C. M. Leung,et al. Applications and design issues for mobile agents in wireless sensor networks , 2007, IEEE Wireless Communications.
[14] P. Lachenbruch. Mathematical Statistics, 2nd Edition , 1972 .
[15] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[16] Yu Hen Hu,et al. Detection, classification, and tracking of targets , 2002, IEEE Signal Process. Mag..
[17] Bing He,et al. An Efficient Authenticated Key Establishment Scheme for Wireless Mesh Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[18] Min Chen,et al. Mobile multimedia sensor networks: architecture and routing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[19] Nitin H. Vaidya,et al. Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[20] Xiuzhen Cheng,et al. Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[21] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[22] Ran Wolff,et al. In-Network Outlier Detection in Wireless Sensor Networks , 2006, ICDCS.
[23] 조위덕. Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.
[24] Dimitrios Gunopulos,et al. Distributed deviation detection in sensor networks , 2003, SGMD.