Survey on Enhanced Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
暂无分享,去创建一个
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Saurabh Bagchi,et al. Efficient collection of sensor data in remote fields using mobile collectors , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).
[3] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[4] Deborah Estrin,et al. Intelligent fluid infrastructure for embedded networks , 2004, MobiSys '04.
[5] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[6] Thomas F. La Porta,et al. Data Dissemination with Ring-Based Index for Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[7] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[8] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[9] A. Rasheed,et al. An Energy-Efficient Hybrid Data Collection Scheme in Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[10] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[11] M. Welsh,et al. Vital Signs Monitoring and Patient Tracking Over a Wireless Network , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[12] Rabi N. Mahapatra,et al. A key pre-distribution scheme for heterogeneous sensor networks , 2009, IWCMC.
[13] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..