Scalable Security in Wireless Sensor and Actuator Networks ( WSANs )
暂无分享,去创建一个
[1] Martin Haenggi,et al. Mobile sensor-actuator networks: opportunities and challenges , 2002, Proceedings of the 2002 7th IEEE International Workshop on Cellular Neural Networks and Their Applications.
[2] Yee Wei Law,et al. Key Management with Group-Wise Pre-Deployed Keying and Secret Sharing Pre-Deployed Keying , 2002 .
[3] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[4] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[5] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[6] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] Wendi Heinzelman,et al. Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .
[10] J. Zachary,et al. A decentralized approach to secure management of nodes in distributed sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[11] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[12] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[13] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[14] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[15] Kang G. Shin,et al. LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.
[16] Waqaas Siddiqui. SPECTRA: Secure Power Efficient Clustered Topology Routing Algorithm , 2005 .
[17] Wen Hu,et al. An Anycast Service for Hybrid Sensor/Actuator Networks , 2003 .
[18] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[19] Lui Sha,et al. Design and analysis of an MST-based topology control algorithm , 2003, IEEE Transactions on Wireless Communications.
[20] Chi-Fu Huang,et al. A Two-Tier Heterogeneous Mobile Ad Hoc Network Architecture and Its Load-Balance Routing Problem , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[21] Rajeev Barua,et al. Contention-free periodic message scheduler medium access control in wireless sensor/actuator networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[22] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[23] B. Hohlt,et al. Flexible power scheduling for sensor networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[24] Rimon Barr. SWANS- Scalable Wireless Ad hoc Network Simulator User Guide , 2004 .
[25] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[26] Hugh Harney,et al. Group Key Management Protocol (GKMP) Architecture , 1997, RFC.
[27] Y. Tipsuwan,et al. Network-based control systems: a tutorial , 2001, IECON'01. 27th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.37243).
[28] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[29] Mike Chen,et al. Security and Deployment Issues in a Sensor Network , 2000 .
[30] Xiaozhou Li,et al. Batch rekeying for secure group communications , 2001, WWW '01.
[31] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[32] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[33] K. Wehrle,et al. Accurate prediction of power consumption in sensor networks , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..
[34] Yee Wei Law,et al. Assessing Security-Critical Energy-Efficient Sensor Networks , 2002 .
[35] T. La Porta,et al. On supporting distributed collaboration in sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[36] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[37] Kanad Ghose,et al. Energy-efficiency of VLSI caches: a comparative study , 1997, Proceedings Tenth International Conference on VLSI Design.
[38] David E. Culler,et al. The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.
[39] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[40] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[41] Maja J. Matarić,et al. A market-based formulation of sensor-actuator network coordination , 2002, AAAI 2002.
[42] Hongyi Wu,et al. Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations , 2006, IEEE Transactions on Mobile Computing.
[43] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[44] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[45] Hongyi Wu,et al. Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations , 2006 .
[46] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[47] Matt Welsh,et al. Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.
[48] Sunil Kumar,et al. The integration of ad hoc sensor and cellular networks for multi-class data transmission , 2006, Ad Hoc Networks.
[49] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.