HHT-Based Security Enhancement Approach with Low Overhead for Coding-Based Reprogramming Protocols in Wireless Sensor Networks
暂无分享,去创建一个
Zenggang Xiong | Meikang Qiu | Lina Yang | Shining Li | Meikang Qiu | Z. Xiong | Shining Li | Lina Yang
[1] Reza Curtmola,et al. Practical defenses against pollution attacks in wireless network coding , 2011, TSEC.
[2] David Starobinski,et al. Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[3] Meikang Qiu,et al. Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.
[4] Rajeev Gandhi,et al. Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.
[5] Indranil Gupta,et al. AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[6] Michele Zorzi,et al. SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[7] Erman Ayday,et al. Data authenticity and availability in multihop wireless sensor networks , 2012, TOSN.
[8] Jussi Kangasharju,et al. Piece Fingerprinting: Binding Content and Data Blocks Together in Peer-to-Peer Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[9] Adão Silva,et al. Power allocation strategies for distributed precoded multicell based systems , 2011, EURASIP J. Wirel. Commun. Netw..
[10] Wei Dong,et al. A Lightweight and Density-Aware Reprogramming Protocol for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.
[11] Chun Chen,et al. SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2012, IEEE Transactions on Industrial Electronics.
[12] Meikang Qiu,et al. Online optimization for scheduling preemptable tasks on IaaS cloud systems , 2012, J. Parallel Distributed Comput..
[13] Michele Zorzi,et al. SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes , 2010, IEEE Transactions on Mobile Computing.
[14] Erman Ayday,et al. A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks , 2012, Ad Hoc Networks.
[15] Meikang Qiu,et al. Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability , 2012, J. Parallel Distributed Comput..
[16] Marimuthu Palaniswami,et al. Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[17] Daniel R. L. Brown. Generic Groups, Collision Resistance, and ECDSA , 2002, Des. Codes Cryptogr..
[18] Jia Liu,et al. Frequency Tuning of Work Modes in Z-Axis Dual-Mass Silicon Microgyroscope , 2014, J. Sensors.
[19] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[20] Peng Ning,et al. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[21] Chun Chen,et al. DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks , 2012, IEEE Transactions on Wireless Communications.
[22] Meikang Qiu,et al. Informer homed routing fault tolerance mechanism for wireless sensor networks , 2013, J. Syst. Archit..
[23] Dirk Westhoff,et al. Security enhanced multi-hop over the air reprogramming with Fountain Codes , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[24] Yong Guan,et al. An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks , 2009, IEEE INFOCOM 2009.
[25] David E. Culler,et al. The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.
[26] Marimuthu Palaniswami,et al. Analytical model of coding-based reprogramming protocols in lossy wireless sensor networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[27] Chonghuan Xu,et al. Key Updating Methods for Combinatorial Design Based Key Management Schemes , 2014, J. Sensors.