Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks
暂无分享,去创建一个
[1] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[2] David E. Culler,et al. TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.
[3] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[4] Christof Paar,et al. Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers , 2008, 2008 International Symposium on Industrial Embedded Systems.
[5] Matt Welsh,et al. Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.
[6] Benton H. Calhoun,et al. Body Area Sensor Networks: Challenges and Opportunities , 2009, Computer.
[7] Zhi Ang Eu,et al. Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP) - Survey and challenges , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.
[8] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[9] S. Petersen,et al. Wireless Sensor Networks: Introduction to Installation and Integration on an Offshore Oil & Gas Platform , 2008 .
[10] E. Lewis,et al. Wireless Sensor Node hardware: A review , 2008, 2008 IEEE Sensors.
[11] Saurabh Bagchi,et al. Optimizing AES for embedded devices and wireless sensor networks , 2008 .
[12] Nael B. Abu-Ghazaleh,et al. An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.
[13] Dennis Pfisterer,et al. Comprehensible security synthesis for wireless sensor networks , 2008, MidSens '08.
[14] S. Shankar Sastry,et al. Time synchronization attacks in sensor networks , 2005, SASN '05.
[15] Anish Arora,et al. Spatial Signatures for Lightweight Security in Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[16] Mohammad Ilyas,et al. Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.
[17] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[18] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[19] Stefanos Gritzalis,et al. Situation awareness mechanisms for wireless sensor networks , 2008, IEEE Communications Magazine.
[20] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[21] Seokhie Hong,et al. TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote , 2008, IEICE Trans. Inf. Syst..
[22] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.
[23] Juan Manuel González Nieto,et al. RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[24] Felix C. Freiling,et al. Intrusion Detection in Wireless Sensor Networks , 2009 .
[25] Dario Pompili,et al. Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.
[26] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[27] Stefanos Gritzalis,et al. Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach , 2008, Int. J. Syst. Syst. Eng..
[28] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[29] Yuan Li,et al. Research challenges and applications for underwater sensor networking , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[30] Azzedine Boukerche,et al. Secure time synchronization protocols for wireless sensor networks , 2007, IEEE Wireless Communications.
[31] David E. Culler,et al. A building block approach to sensornet systems , 2008, SenSys '08.
[32] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[33] Frank Stajano,et al. Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks , 2008, ACNS.
[34] Li Xiao,et al. Securing Sensor Nodes Against Side Channel Attacks , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[35] Scott F. Midkiff,et al. Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.
[36] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[37] Mani Srivastava,et al. Overview of sensor networks , 2004 .
[38] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[39] Kyung Jun Choi,et al. Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.
[40] Rodrigo Roman,et al. Secure Management of SCADA Networks , 2008 .
[41] Cristina Alcaraz,et al. Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios , 2006, CRITIS.
[42] Cristina Alcaraz,et al. On the Hardware Implementation Efficiency of Cryptographic Primitives , 2008 .
[43] Juan Manuel González Nieto,et al. Secure Data Aggregation in Wireless Sensor Network: a survey , 2008, AISC.
[44] M. Gasulla,et al. A Review of Commercial Energy Harvesters for Autonomous Sensors , 2007, 2007 IEEE Instrumentation & Measurement Technology Conference IMTC 2007.
[45] Xiaoyun Wang,et al. Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.
[46] Michael Scott,et al. On the application of pairing based cryptography to wireless sensor networks , 2009, WiSec '09.
[47] Yan Sun,et al. Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[48] Ronald E. Fisher,et al. Analyzing Cross-Sector Interdependencies , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[49] J. Barondess. On excellence. , 1988, The Pharos of Alpha Omega Alpha-Honor Medical Society. Alpha Omega Alpha.
[50] Ian F. Akyildiz,et al. Wireless underground sensor networks: Research challenges , 2006, Ad Hoc Networks.
[51] Rodrigo Roman,et al. Integrating wireless sensor networks and the internet: a security analysis , 2009, Internet Res..
[52] Adrian Perrig,et al. SAKE: Software attestation for key establishment in sensor networks , 2008, Ad Hoc Networks.
[53] Ian F. Akyildiz,et al. Cross-Layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[54] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[55] Srdjan Capkun,et al. Secure Time Synchronization in Sensor Networks , 2008, TSEC.
[56] Kyung Sup Kwak,et al. A Study of Implanted and Wearable Body Sensor Networks , 2008, KES-AMSTA.
[57] Antonio Brogi,et al. Towards Secure Middleware for Embedded Peer-to-Peer Systems : Objectives & Requirements , 2007 .
[58] R. Castro. Application-driven security in wireless sensor networks (seguridad orientada a aplicaciones en redes de sensores) , 2008 .
[59] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[60] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[61] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[62] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[63] Rodrigo Roman,et al. A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks , 2008, CANS.
[64] Maximilian Ott,et al. Source-location privacy for networks of energy-constrained sensors , 2004 .
[65] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[66] Michael,et al. [IEEE 2008 IEEE Sensors - Lecce, Italy (2008.10.26-2008.10.29)] 2008 IEEE Sensors - Wireless Sensor Node hardware: A review , 2008 .
[67] Ian F. Akyildiz,et al. Wireless multimedia sensor networks: A survey , 2007, IEEE Wireless Communications.
[68] Hsiao-Hwa Chen,et al. Trust and Reputation Systems for Wireless Sensor Networks , 2009 .
[69] Seyit Camtepe,et al. Key Management in Wireless Sensor Networks , 2008 .
[70] Deborah Estrin,et al. Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.