Detection of Node Capture Attack in Wireless Sensor Networks
暂无分享,去创建一个
[1] Sanjay Srivastava,et al. Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network , 2015, ICISS.
[2] Taekyoung Kwon,et al. FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks , 2016, IEEE Transactions on Industrial Informatics.
[3] Jun-won Ho. Distributed Detection of Node Capture Attacks in Wireless Sensor Networks , 2010 .
[4] Roberto Di Pietro,et al. Mobility and Cooperation to Thwart Node Capture Attacks in MANETs , 2009, EURASIP J. Wirel. Commun. Netw..
[5] Ajay D. Kshemkalyani,et al. On probabilities of hash value matches , 1998, Comput. Secur..
[6] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[7] Sung-Ming Yen,et al. Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[8] Wen Hu,et al. A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks , 2011, PM2HW2N '11.
[9] Ashok K. Turuk,et al. A comparative analysis of node replica detection schemes in wireless sensor networks , 2016, J. Netw. Comput. Appl..
[10] Kang G. Shin,et al. Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks , 2006, SecureComm.
[11] Rodrigo Roman,et al. A Novel Key Update Protocol in Mobile Sensor Networks , 2012, ICISS.
[12] Christoph Krauß,et al. Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques , 2007, ESAS.
[13] Deng Pan,et al. Unpredictable Software-based Attestation Solution for node compromise detection in mobile WSN , 2010, 2010 IEEE Globecom Workshops.
[14] Sumanth Yenduri,et al. First stage detection of compromised nodes in sensor networks , 2010, 2010 IEEE Sensors Applications Symposium (SAS).
[15] Jun Zhao,et al. On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks , 2017, IEEE Transactions on Information Forensics and Security.
[16] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[17] Kang G. Shin,et al. Soft tamper-proofing via program integrity verification in wireless sensor networks , 2005, IEEE Transactions on Mobile Computing.