Mitigation of Wormhole Attack in Wireless Sensor Networks
暂无分享,去创建一个
[1] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[2] Aleksandar Milenkovic,et al. Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..
[3] Wei Yang,et al. Wireless Sensor Network Based Coal Mine Wireless and Integrated Security Monitoring Information System , 2007, Sixth International Conference on Networking (ICN'07).
[4] Douglas R. Stinson,et al. Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.
[5] Fuxiang Gao,et al. Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis , 2010, 2010 WASE International Conference on Information Engineering.
[6] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[7] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[8] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.
[9] Gicheol Wang,et al. A Pair-Wise Key Agreement Scheme in Ad Hoc Networks , 2004, International Conference on Computational Science.
[10] ALESSANDRA TONINELLI,et al. Enabling secure service discovery in mobile healthcare enterprise networks , 2009, IEEE Wireless Communications.
[11] G. Vinitha,et al. An Approach Towards Detection of Wormhole Attack in Sensor Networks , 2010, 2010 First International Conference on Integrated Intelligent Computing.
[12] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[13] Reihaneh Safavi-Naini,et al. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks , 2009, ADHOCNETS.
[14] Peng Ning,et al. Secure and resilient clock synchronization in wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[15] Ingrid Verbauwhede,et al. Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .
[16] David Boyle,et al. Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.
[17] Yu Wang,et al. A multipath routing protocol for wireless sensor network for mine security monitoring , 2010 .
[18] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[19] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[20] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[21] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[22] Yuguang Fang,et al. Security in wireless sensor networks , 2007 .
[23] YangYang,et al. Wireless sensor and actuator networks , 2010 .
[24] Kyung Jun Choi,et al. Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.
[25] Azzedine Boukerche,et al. A Taxonomy of Routing Protocols in Sensor Networks , 2008, Algorithms and Protocols for Wireless Sensor Networks.
[26] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[27] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[28] Andreas Pitsillides,et al. A survey on secure multipath routing protocols in WSNs , 2010, Comput. Networks.
[29] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[30] Ulrike Meyer,et al. Security and privacy for mobile electronic health monitoring and recording systems , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[31] Lijun Qian,et al. Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..
[32] Robert Steele,et al. Elderly persons' perception and acceptance of using wireless sensor networks to assist healthcare , 2009, Int. J. Medical Informatics.
[33] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[34] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[35] E. Rogers. Diffusion of Innovations , 1962 .
[36] Y. M. Huang,et al. Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.
[37] Qianping Wang,et al. The Research and Design of Routing Protocols of Wireless Sensor Network in Coal Mine Data Acquisition , 2007, 2007 International Conference on Information Acquisition.
[38] Nora Cuppens-Boulahia,et al. Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks , 2010, 2010 8th Annual Communication Networks and Services Research Conference.
[39] Rabi N. Mahapatra,et al. Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.
[40] Srdjan Capkun,et al. Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.
[41] Catherine Rosenberg,et al. A Taxonomy-based Approach to Design of Large-scale Sensor Networks , 2008 .
[42] Amir Hossein Jahangir,et al. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .
[43] Marios D. Dikaiakos,et al. Data Privacy considerations in Intensive Care Grids , 2008, HealthGrid.
[44] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[45] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[46] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..