Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks
暂无分享,去创建一个
[1] B. R. Badrinath,et al. ReInForM: reliable information forwarding using multiple paths in sensor networks , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..
[2] Özgür B. Akan,et al. ESRT: event-to-sink reliable transport in wireless sensor networks , 2003, MobiHoc '03.
[3] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[4] B. R. Badrinath,et al. Information assurance in sensor networks , 2003, WSNA '03.
[5] Wendi B. Heinzelman,et al. Application-specific protocol architectures for wireless networks , 2000 .
[6] Rajiv Gandhi,et al. Approximation algorithms for partial covering problems , 2004, J. Algorithms.
[7] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[8] John Heidemann,et al. RMST: reliable data transport in sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[9] Vishal Anand,et al. SAWAN: a survivable architecture for wireless LANs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).
[10] Deborah Estrin,et al. Rumor routing algorthim for sensor networks , 2002, WSNA '02.
[11] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[12] Hemraj Saini,et al. Extended Cell Planning for Capacity Expansion and Power Optimization by Using MEMETIC Algorithm , 2012, Int. J. Wirel. Networks Broadband Technol..
[13] John Heidemann,et al. BARD: Bayesian Assisted Resource Discovery , 2004 .
[14] Sencun Zhu,et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.
[15] John S. Heidemann,et al. BARD: Bayesian-assisted resource discovery in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[16] Donggang Liu,et al. Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.
[17] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[18] Chieh-Yih Wan,et al. PSFQ: a reliable transport protocol for wireless sensor networks , 2002, WSNA '02.
[19] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[20] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[21] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[22] J. J. Garcia-Luna-Aceves,et al. Reliable data delivery in event-driven wireless sensor networks , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[23] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[24] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[25] Mani Srivastava,et al. Energy efficient routing in wireless sensor networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[26] Issa M. Khalil,et al. DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[27] Adam Dunkels,et al. Distributed tcp caching for wireless sensor networks , 2004 .
[28] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[29] Vassilios S. Verykios,et al. Advances in Privacy Preserving Record Linkage , 2012 .
[30] Bernadette H. Schell,et al. Female and Male Hacker Conferences Attendees: Their Autism-Spectrum Quotient (AQ) Scores and Self-Reported Adulthood Experiences , 2011 .
[31] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[32] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[33] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[34] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[35] Reza Curtmola,et al. BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks , 2007, IEEE Transactions on Mobile Computing.
[36] Daji Qiao,et al. Distinguishing Data Transience from False Injection in Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[37] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[38] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[39] Deborah Estrin,et al. Modelling Data-Centric Routing in Wireless Sensor Networks , 2002 .
[40] Cauligi S. Raghavendra,et al. PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.
[41] Sabbir Ahmed,et al. BER Fairness and PAPR Study of Interleaved OFDMA System , 2011, Int. J. Wirel. Networks Broadband Technol..
[42] Ronitt Rubinfeld,et al. Fast approximate PCPs , 1999, STOC '99.
[43] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[44] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.