A probabilistic voting-based filtering scheme in wireless sensor networks
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[2] M. Jiang,et al. Cluster based routing protocol (CBRP) , 1999 .
[3] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[4] Jinyang Li,et al. Cluster Based Routing Protocol(CBRP) Functional Specification , 1999 .
[5] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[6] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[7] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[9] Wendi Heinzelman,et al. Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .
[10] Donggang Liu. Resilient Cluster Formation for Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[11] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[12] Dawn Song,et al. SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..
[13] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[14] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[15] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[16] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[17] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[18] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[19] Fan Ye,et al. Catching "Moles" in Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[20] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.