CSI: Compressed sensing-based clone identification in sensor networks
暂无分享,去创建一个
[1] Chun-Shien Lu,et al. MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.
[2] Donggang Liu. Protecting Neighbor Discovery Against Node Compromises in Sensor Networks , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[3] Ming Zhang,et al. Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks , 2009, 2009 17th IEEE International Conference on Network Protocols.
[4] Thomas F. La Porta,et al. SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[5] Zhongming Zheng,et al. Energy and Memory Efficient Clone Detection in Wireless Sensor Networks , 2016, IEEE Transactions on Mobile Computing.
[6] Wen Hu,et al. Efficient Computation of Robust Average of Compressive Sensing Data in Wireless Sensor Networks in the Presence of Sensor Faults , 2013, IEEE Transactions on Parallel and Distributed Systems.
[7] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[8] Sushil Jajodia,et al. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[9] Dongming Lu,et al. Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing , 2016, TNET.
[10] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[11] Michael D. Smith,et al. Implementing public-key infrastructure for sensor networks , 2008, TOSN.
[12] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[13] Joonsang Baek,et al. Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.
[14] Panagiotis Papadimitratos,et al. A practical secure neighbor verification protocol for wireless sensor networks , 2009, WiSec '09.
[15] Jie Gao,et al. Double rulings for information brokerage in sensor networks , 2009, TNET.
[16] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[17] Steven S. Lumetta,et al. Using the Power of Two Choices to Improve Bloom Filters , 2007, Internet Math..
[18] Jiannong Cao,et al. Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.
[19] Jianzhong Li,et al. Distributed Data Aggregation Scheduling in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.
[20] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[21] Chun-Shien Lu,et al. Noninteractive Pairwise Key Establishment for Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.
[22] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[23] Tommaso Melodia,et al. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks , 2012, IEEE Transactions on Mobile Computing.
[24] Radha Poovendran,et al. A convex optimization approach for clone detection in wireless sensor networks , 2013, Pervasive Mob. Comput..
[25] Joel A. Tropp,et al. Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.
[26] C.-S. Lu,et al. Constrained Function-Based Message Authentication for Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.
[27] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[28] Mahmut T. Kandemir,et al. On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[29] Yingshu Li,et al. Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[30] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[31] Ashok K. Turuk,et al. A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..
[32] Guang Gong,et al. On the Node Clone Detection in Wireless Sensor Networks , 2013, IEEE/ACM Transactions on Networking.
[33] Saurabh Bagchi,et al. Secure Neighbor Discovery through Overhearing in Static Multihop Wireless Networks , 2010, 2010 Fifth IEEE Workshop on Wireless Mesh Networks.
[34] Dong Hoon Lee,et al. Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks , 2013, IEEE Systems Journal.
[35] Chun-Shien Lu,et al. Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[36] Yacine Challal,et al. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.
[37] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[38] Ashok K. Turuk,et al. Node coloring based replica detection technique in wireless sensor networks , 2014, Wirel. Networks.
[39] Fang Liu,et al. Real-Time Detection of Clone Attacks in Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[40] Jun Sun,et al. Compressive data gathering for large-scale wireless sensor networks , 2009, MobiCom '09.
[41] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[42] Pramod K. Varshney,et al. Sensor Selection Based on Generalized Information Gain for Target Tracking in Large Sensor Networks , 2013, IEEE Transactions on Signal Processing.