A survey on security threats and authentication approaches in wireless sensor networks
暂无分享,去创建一个
[1] Rasim M. Alguliev,et al. Hierarchical routing in wireless sensor networks: a survey , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[2] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[3] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[4] V. Vijayalakshmi,et al. Effective Key Establishment and Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve ... 1 Effective Key Establishment and Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography , 2008 .
[5] S. Raja Rajeswari,et al. Secured Energy Conserving Slot-Based Topology Maintenance Protocol for Wireless Sensor Networks , 2016, Wirel. Pers. Commun..
[6] 杨秋伟. Survey of Security Technologies on Wireless Sensor Networks , 2015 .
[7] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[8] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[9] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[10] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..