OPSENET: A Security-Enabled Routing Scheme for a System of Optical Sensor Networks
暂无分享,去创建一个
[1] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[2] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[3] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[4] Tomoaki Ohtsuki,et al. Optical Wireless Sensor Network System Using Corner Cube Retroreflectors , 2005, EURASIP J. Wirel. Commun. Netw..
[5] Jordi Petit Silvestre,et al. A Random graph model for optical networks of sensors , 2002 .
[6] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[7] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[8] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[9] Jaime Llorca,et al. Reconfigurable optical wireless sensor networks , 2004, SPIE Remote Sensing.
[10] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[11] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[12] José D. P. Rolim,et al. Efficient and reliable high level communication in randomly deployed wireless sensor networks , 2004, MobiWac '04.
[13] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[14] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[15] Deepa Kundur,et al. Efficient routing protocols for a free space optical sensor network , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[16] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[17] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[18] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[19] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[20] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[21] D. Kundur,et al. Distributed privacy for visual sensor networks via Markov shares , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[22] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[23] Randy H. Katz,et al. Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.
[24] John D. Gonglewski,et al. Optics in Atmospheric Propagation and Adaptive Systems X , 2004 .
[25] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[26] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[27] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[28] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).