Security Attacks and Countermeasures for Wireless Sensor Networks: Survey
暂无分享,去创建一个
[1] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[2] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[3] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[4] Bo Zhu,et al. Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN , 2009, ISA.
[5] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[6] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[7] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[8] Radha Poovendran,et al. Secure Broadcast in Energy-Aware Wireless Sensor Networks , 2002 .
[9] Adrian Perrig,et al. SAKE: Software attestation for key establishment in sensor networks , 2008, Ad Hoc Networks.
[10] Ahmed Helmy,et al. Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.
[11] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[12] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[13] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[14] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[15] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[16] Zhilbert Tafa. Ubiquitous Sensor Networks , 2011 .
[17] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[18] Adrian Perrig,et al. SAKE: Software attestation for key establishment in sensor networks , 2011, Ad Hoc Networks.
[19] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[20] Mingbo Xiao,et al. Cross-Layer Design for the Security of Wireless Sensor Networks , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[21] Kalpana Sharma,et al. Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.
[22] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[23] Adrian Perrig,et al. The Coremelt Attack , 2009, ESORICS.
[24] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[25] Kalpana Sharma,et al. A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks , 2010 .
[26] Hiroshi Ishii,et al. Threat Models and Security Issues in Wireless Sensor Networks , 2010 .
[27] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[28] A. Zomaya,et al. A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..
[29] Radha Poovendran,et al. Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[30] Xun Wang,et al. Sensor network configuration under physical attacks , 2005, Int. J. Ad Hoc Ubiquitous Comput..
[31] Garimella Rama Murthy,et al. Distributed key management for wireless sensor networks , 2009, Q2SWinet '09.
[32] Tanveer A. Zia,et al. Cross-layer based security solutions for wireless sensor networks , 2011 .
[33] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[34] Chee-Onn Chow,et al. A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.