False Data Detection in Wireless Sensor Network with Secure communication
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[2] Haiyun Luo,et al. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.
[3] Sushil Jajodia,et al. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks , 2007, TOSN.
[4] Shouhuai Xu. On the security of group communication schemes based on symmetric key cryptosystems , 2005, SASN '05.
[5] Frederik Armknecht,et al. Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.
[6] Songwu Lu,et al. Commutative cipher based en-route filtering in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[7] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[8] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[9] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[10] William Millan,et al. 3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function , 2005, IACR Cryptol. ePrint Arch..
[11] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[12] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[13] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[14] Deva Seetharam,et al. An efficient pseudo random number generator for low-power sensor networks [wireless networks] , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[15] Deborah Estrin,et al. Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[16] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[17] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.