Identifying and Isolating Aberrant Nodes in Wireless Sensor Networks
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[2] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[3] Anupam Joshi,et al. Secure sensor networks for perimeter protection , 2003, Comput. Networks.
[4] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[5] Fei Hu,et al. Secure Wireless Sensor Networks: Problems and Solutions , 2003 .
[6] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[7] H. Cam,et al. Energy efficient security protocol for wireless sensor networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[8] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[9] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[10] Mike Chen,et al. Security and Deployment Issues in a Sensor Network , 2000 .