Acquiring Authentic Data in Unattended Wireless Sensor Networks
暂无分享,去创建一个
[1] Chun-Shien Lu,et al. A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[2] Christoph Krauß,et al. Defending against false-endorsement-based dos attacks in wireless sensor networks , 2008, WiSec '08.
[3] Gene Tsudik,et al. Extended Abstract: Forward-Secure Sequential Aggregate Authentication , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Azzedine Boukerche,et al. Secure time synchronization protocols for wireless sensor networks , 2007, IEEE Wireless Communications.
[5] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[6] Claudio Soriente,et al. Data Security in Unattended Wireless Sensor Networks , 2009, IEEE Transactions on Computers.
[7] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[8] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[9] Claudio Soriente,et al. Collaborative authentication in unattended WSNs , 2009, WiSec '09.
[10] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[11] Srdjan Capkun,et al. Secure Time Synchronization in Sensor Networks , 2008, TSEC.
[12] Claudio Soriente,et al. New adversary and new threats: security in unattended sensor networks , 2009, IEEE Network.
[13] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[14] Brad Karp,et al. Greedy Perimeter Stateless Routing for Wireless Networks , 2000 .
[15] Claudio Soriente,et al. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks , 2008, 2008 Symposium on Reliable Distributed Systems.
[16] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.
[17] Peng Ning,et al. Secure and resilient clock synchronization in wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[18] Gene Tsudik,et al. DISH: Distributed Self-Healing in Unattended Sensor Networks , 2008, IACR Cryptol. ePrint Arch..
[19] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[20] Fang Liu,et al. iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[21] Peng Ning,et al. Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks , 2009, 2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous.
[22] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[23] Shivakant Mishra,et al. Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.
[24] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[25] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[26] Sushil Jajodia,et al. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks , 2007, TOSN.