Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge
暂无分享,去创建一个
Meng Wu | Lijun Yang | Chao Ding | Lijun Yang | Meng Wu | C. Ding
[1] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[2] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[3] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[4] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Li-Wei Kang,et al. Deterministic detection of node replication attacks in sensor networks , 2015, 2015 IEEE International Conference on Consumer Electronics - Taiwan.
[6] Sushil Jajodia,et al. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Elaine B. Barker,et al. Recommendation for key management: , 2019 .
[9] Meng Wu,et al. RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks , 2015, KSII Trans. Internet Inf. Syst..
[10] Ricardo Dahab,et al. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008 .
[11] Shirshu Varma,et al. Distance measurement and error estimation scheme for RSSI based localization in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Wireless Communication and Sensor Networks (WCSN).
[12] P. Abinaya,et al. Dynamic detection of node replication attacks using X-RED in wireless sensor networks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[13] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[14] Labraoui Nabila,et al. The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2014, 2014 International Conference on Advanced Networking Distributed Systems and Applications.
[15] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[16] Guo Cheng,et al. Replication attack detection with monitor nodes in clustered wireless sensor networks , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).
[17] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[18] Jonathan Katz,et al. Aggregate Message Authentication Codes , 1995 .
[19] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[20] Peng Ning,et al. A beacon-less location discovery scheme for wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[21] Andrea Zanella,et al. Experimental comparison of RSSI-based localization algorithms for indoor wireless sensor networks , 2008, REALWSN '08.
[22] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[23] Ricardo Dahab,et al. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.
[24] Moses Charikar,et al. Similarity estimation techniques from rounding algorithms , 2002, STOC '02.
[25] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[26] Sajal K. Das,et al. Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks , 2009, Ad Hoc Networks.
[27] Thomas F. La Porta,et al. SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[28] Qian Wang,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[29] Riccardo Pecori,et al. S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia , 2016, Comput. Networks.
[30] Yuxiang Wang,et al. Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..
[31] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.