Attacks And Defenses Of Ubiquitous Sensor Networks
暂无分享,去创建一个
[1] Pravin Varaiya,et al. PEDAMACS: power efficient and delay aware medium access protocol for sensor networks , 2004, IEEE Transactions on Mobile Computing.
[2] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[3] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[4] David E. Culler,et al. Active Message Communication for Tiny Networked Sensors , 2000 .
[5] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[6] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[7] Cheryl L. Beaver,et al. Key Management for SCADA , 2002 .
[8] Hugo Krawczyk,et al. Strengthening Digital Signatures Via Randomized Hashing , 2006, CRYPTO.
[9] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[10] Samuel S. Blackman,et al. Multiple-Target Tracking with Radar Applications , 1986 .
[11] R Bellman,et al. On the Theory of Dynamic Programming. , 1952, Proceedings of the National Academy of Sciences of the United States of America.
[12] George Cybenko,et al. Detection of attacks on cognitive channels , 2008 .
[13] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[14] EstrinDeborah,et al. Fine-grained network time synchronization using reference broadcasts , 2002 .
[15] Gabor Karsai,et al. A testbed for secure and robust SCADA systems , 2008, SIGBED.
[16] Yaakov Bar-Shalom,et al. Estimation and Tracking: Principles, Techniques, and Software , 1993 .
[17] Jean-Yves Le Boudec,et al. Analysis of a robust reputation system for self-organised networks , 2005, Eur. Trans. Telecommun..
[18] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[19] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[20] Tarek F. Abdelzaher,et al. AIDA: Adaptive application-independent data aggregation in wireless sensor networks , 2004, TECS.
[21] S. Sastry,et al. Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[22] Philip Ginzboorg,et al. Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems , 2004, ESAS.
[23] J. Regehr,et al. Memory Safety and Untrusted Extensions for TinyOS , 2006 .
[24] Yongdae Kim,et al. Remote Software-Based Attestation for Wireless Sensors , 2005, ESAS.
[25] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[26] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[27] Robert Morris,et al. Designing a framework for active worm detection on global networks , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..
[28] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[29] Matt Welsh,et al. Sensor networks for medical care , 2005, SenSys '05.
[30] David E. Culler,et al. Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[31] Kay Römer. Time synchronization in ad hoc networks , 2001, MobiHoc '01.
[32] S. Shankar Sastry,et al. Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems , 2009, Ad Hoc Networks.
[33] S. Sastry,et al. An Efficient Algorithm for Tracking Multiple Maneuvering Targets , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[34] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[35] F. Mosteller,et al. Understanding robust and exploratory data analysis , 1985 .
[36] Peter J. Rousseeuw,et al. Robust Regression and Outlier Detection , 2005, Wiley Series in Probability and Statistics.
[37] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[38] Tetsu Iwata,et al. Side Channel Attacks on Message Authentication Codes , 2005, ESAS.
[39] Shivakant Mishra,et al. Security support for in-network processing in Wireless Sensor Networks , 2003, SASN '03.
[40] Sonja Buchegger,et al. Coping With Misbehavior in Mobile Ad-hoc Networks , 2004 .
[41] Vincent Buskens,et al. Social networks and trust , 1999 .
[42] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[43] Stephen B. Wicker,et al. Transactional Confidentiality in Sensor Networks , 2008, IEEE Security & Privacy.
[44] H. Kushner,et al. Stochastic Approximation and Recursive Algorithms and Applications , 2003 .
[45] Rıdvan Berber. Methods of model based process control , 1995 .
[46] Deborah Estrin,et al. Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[47] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[48] Deborah Estrin,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Fine-grained Network Time Synchronization Using Reference Broadcasts , 2022 .
[49] S. Shankar Sastry,et al. Time synchronization attacks in sensor networks , 2005, SASN '05.
[50] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[51] Robert A. Greenes,et al. SMART--an integrated wireless system for monitoring unattended patients. , 2008, Journal of the American Medical Informatics Association : JAMIA.
[52] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[53] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[54] David Gay,et al. Software design patterns for TinyOS , 2005, LCTES '05.
[55] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[56] Vincent H. Berk,et al. An overview of process query systems , 2004, SPIE Defense + Commercial Sensing.
[57] S. Buchegger,et al. A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .
[58] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[59] Vladimiro Sassone,et al. A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..
[60] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[61] Gyula Simon,et al. The flooding time synchronization protocol , 2004, SenSys '04.
[62] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[63] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[64] Saurabh Ganeriwal,et al. Timing-sync protocol for sensor networks , 2003, SenSys '03.
[65] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[66] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[67] Stephen B. Wicker,et al. Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[68] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[69] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[70] Vincent H. Berk,et al. Detection of complex cyber attacks , 2006, SPIE Defense + Commercial Sensing.
[71] T. Başar,et al. A New Approach to Linear Filtering and Prediction Problems , 2001 .
[72] S. Shankar Sastry,et al. A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments , 2004, ICCSA.
[73] Aleksandar Milenkovic,et al. Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..
[74] John S. Baras,et al. Performance Comparison of Detection Schemes for MAC Layer Misbehavior , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[75] W. Hamilton,et al. The evolution of cooperation. , 1984, Science.
[76] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[77] Robert W. Shirey,et al. Internet Security Glossary , 2000, RFC.
[78] B. Hohlt,et al. Flexible power scheduling for sensor networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[79] Valentine Crespi,et al. Decentralized sensing and tracking for UAV scheduling , 2004, SPIE Defense + Commercial Sensing.
[80] Majid Sarrafzadeh,et al. Medical Embedded Systems , 2007, IESS.
[81] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[82] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[83] Insup Lee,et al. Quantifying eavesdropping vulnerability in sensor networks , 2005, DMSN '05.
[84] Shashidhar Gandham,et al. STCP: a generic transport layer protocol for wireless sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..
[85] Roberto Di Pietro,et al. Efficient and resilient key discovery based on pseudo-random key pre-deployment , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[86] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[87] S. Shankar Sastry,et al. Distributed Reputation System for Tracking Applications in Sensor Networks , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.
[88] S. Shankar Sastry,et al. Integrity checker for wireless sensor networks in health care applications , 2008, Pervasive 2008.
[89] K.K. Venkatasubramanian,et al. Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.
[90] Deirdre K. Mulligan,et al. Con dentiality In Sensor Networks : Transactional Information , 2007 .
[91] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[92] Michael O. Kolawole,et al. Estimation and tracking , 2002 .
[93] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[94] Yong Tan,et al. Evaluation and design of online cooperative feedback mechanisms for reputation management , 2005, IEEE Transactions on Knowledge and Data Engineering.
[95] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[96] Zhu Han,et al. A self-learning repeated game framework for optimizing packet forwarding networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[97] Paul Resnick,et al. Reputation systems , 2000, CACM.
[98] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[99] Songhwai Oh,et al. Markov chain Monte Carlo data association for general multiple-target tracking problems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[100] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[101] Gyula Simon,et al. Countersniper system for urban warfare , 2005, TOSN.
[102] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[103] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[104] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[105] Fredrik Gustafsson,et al. Monte Carlo data association for multiple target tracking , 2001 .
[106] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[107] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[108] K. Wac,et al. Mobile patient monitoring: the MobiHealth system. , 2004, Studies in health technology and informatics.
[109] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[110] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[111] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[112] Ulf Lindqvist,et al. Key management and secure software updates in wireless process control environments , 2008, WiSec '08.
[113] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[114] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[115] Syed Masud Mahmud,et al. Group Key Management for Secure Multicasting in Remote Software Upload to Future Vehicles , 2006 .
[116] S. Shankar Sastry,et al. Testbed Implementation of a Secure Flooding Time Synchronization Protocol , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[117] Allen B. MacKenzie. Game theoretic analysis of power control and medium access control , 2003 .
[118] Y. Bar-Shalom. Tracking and data association , 1988 .
[119] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[120] E. Byres,et al. The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems , 2004 .
[121] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[122] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[123] Tassos Dimitriou,et al. Secure and Efficient In-Network Processing for Sensor Networks , 2004 .
[124] Ajay D. Kshemkalyani,et al. Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.
[125] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.