Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation
暂无分享,去创建一个
[1] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[2] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[3] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[4] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[5] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[7] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[8] S. Zhu,et al. GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[9] Wenjing Lou,et al. A new approach for random key pre-distribution in large-scale wireless sensor networks , 2006, Wirel. Commun. Mob. Comput..
[10] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[11] Ivan Stojmenovic,et al. Geocasting with guaranteed delivery in sensor networks , 2004, IEEE Wireless Communications.
[12] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[13] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[14] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[15] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[16] Wenjing Lou,et al. Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[17] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[18] Radha Poovendran,et al. Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[19] Sencun Zhu,et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.
[20] Wenjing Lou,et al. Attribute-based on-demand multicast group setup with membership anonymity , 2008, SecureComm.
[21] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[22] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[23] Guohong Cao,et al. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[24] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[25] Ian F. Akyildiz,et al. A scalable approach for reliable downstream data delivery in wireless sensor networks , 2004, MobiHoc '04.
[26] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[27] Sajal K. Das,et al. Group key distribution via local collaboration in wireless sensor networks , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[28] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[29] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[30] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[31] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[32] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[33] Deborah Estrin,et al. Directed diffusion for wireless sensor networking , 2003, TNET.