Security for Multihop Wireless Networks

No wonder you activities are, reading will be always needed. It is not only to fulfil the duties that you need to finish in deadline time. Reading will encourage your mind and thoughts. Of course, reading will greatly develop your experiences about everything. Reading security for multihop wireless networks is also a way as one of the collective books that gives many advantages. The advantages are not only for you, but for the other peoples with those meaningful benefits.

[1]  Yuanyuan Zhou,et al.  Design of embedded secure gateway based on 6LoWPAN , 2011, 2011 IEEE 13th International Conference on Communication Technology.

[2]  Wei Luo,et al.  The Analysis of 6LowPAN Technology , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[3]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[4]  Michael Starsinic System architecture challenges in the home M2M network , 2010, 2010 IEEE Long Island Systems, Applications and Technology Conference.

[5]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[6]  Sachin Agarwal,et al.  Operator-based over-the-air M2M wireless sensor network security , 2010, 2010 14th International Conference on Intelligence in Next Generation Networks.

[7]  Yuchen Zhang,et al.  Architecture and real-time characteristics analysis of the cyber-physical system , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[8]  Nei Kato,et al.  An early warning system against malicious activities for smart grid communications , 2011, IEEE Network.

[9]  Chen Hongsong,et al.  Security and trust research in M2M system , 2011, Proceedings of 2011 IEEE International Conference on Vehicular Electronics and Safety.

[10]  James Won-Ki Hong,et al.  Towards management of machine to machine networks , 2011, 2011 13th Asia-Pacific Network Operations and Management Symposium.

[11]  Xiaohui Liang,et al.  GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.

[12]  Albrecht Schmidt,et al.  What Can the Internet of Things Do for the Citizen? Workshop at Pervasive 2010 , 2010, IEEE Pervasive Comput..

[13]  F StarsinicMichael,et al.  System architecture challenges in the home M2M network , 2010, LISAT 2010.

[14]  Eui-nam Huh,et al.  A dynamic ID-based authentication scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[15]  Min Chen,et al.  Machine-to-Machine Communications: Architectures, Standards and Applications , 2012, KSII Trans. Internet Inf. Syst..

[16]  Lui Sha,et al.  Cyber-Physical Systems: A New Frontier , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[17]  Djamal Zeghlache,et al.  Energy efficiency in M2M networks: A cooperative key establishment system , 2011, 2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).