Security Issues in Wireless Sensor Networks
暂无分享,去创建一个
[1] Mohsen Guizani,et al. A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Trans. Wirel. Commun..
[2] Radha Poovendran,et al. A key management scheme in distributed sensor networks using attack probabilities , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[3] Victor C. M. Leung,et al. Key management issues in wireless sensor networks: current proposals and future developments , 2007, IEEE Wireless Communications.
[4] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[5] David L. Mills,et al. Computer network time synchronization : the network time protocol on earth and in space , 2006 .
[6] Yee Wei Law,et al. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.
[7] Sencun Zhu,et al. Attack-resilient time synchronization for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[8] Cormac J. Sreenan,et al. A new model for updating software in wireless sensor networks , 2006, IEEE Network.
[9] Sajal K. Das,et al. Routing Correlated Data in Wireless Sensor Networks: A Survey , 2007, IEEE Network.
[10] Tzay-Farn Shih,et al. Hierarchical localization strategy for wireless sensor networks , 2008 .
[11] Deborah Estrin,et al. The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[12] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[13] Stefanos Gritzalis,et al. Situation awareness mechanisms for wireless sensor networks , 2008, IEEE Communications Magazine.
[14] Chong-Kwon Kim,et al. Flooding in wireless ad hoc networks , 2001, Comput. Commun..
[15] L. Zhang,et al. A novel scheme for protecting receiver's location privacy in wireless sensor networks , 2008, IEEE Transactions on Wireless Communications.
[16] Dan Popescu,et al. Embedding wireless sensors in UPnP services networks , 2008 .
[17] Rahul Khanna,et al. Control theoretic approach to intrusion detection using a distributed hidden Markov model , 2008, IEEE Wireless Communications.
[18] Nirwan Ansari,et al. Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks , 2007, IEEE Wireless Communications.
[19] Soo-Hyun Park,et al. Modified Backoff Scheme for MAC Performance Enhancement in IEEE 802.15.4 Sensor Network , 2007 .