Exploring security in ZigBee networks
暂无分享,去创建一个
Todd R. Andel | Jeffrey Todd McDonald | Lindsey N. Whitehurst | T. Andel | J. McDonald | Lindsey N. Whitehurst
[1] I. Koren,et al. Fault Diagnosis and Tolerance in Cryptography , 2006 .
[2] Sergio Saponara,et al. Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid , 2012, J. Comput. Networks Commun..
[3] Gabi Dreo Rodosek,et al. Thwarting attacks on ZigBee - Removal of the KillerBee stinger , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).
[4] Christophe Clavier,et al. Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis , 2007 .
[5] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[6] Ken Masica,et al. Recommended Practices Guide for Securing ZigBee Wireless Networks in Process Control System Environments: Draft , 2007 .
[7] Elisa Bertino,et al. Cryptographic Key Management for Smart Power Grids - Approaches and Issues , 2012, ArXiv.
[8] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[9] Bo Sheng,et al. Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.