Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks
暂无分享,去创建一个
[1] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[2] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[3] Koen Langendoen,et al. An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.
[4] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[5] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[6] Mohamed F. Younis,et al. A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[9] Nidal Nasser,et al. SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks , 2007, Comput. Commun..
[10] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[11] Boleslaw K. Szymanski,et al. SENSE: A WIRELESS SENSOR NETWORK SIMULATOR , 2005 .
[12] Takashi Ito,et al. A key pre-distribution scheme for secure sensor networks using probability density function of node deployment , 2005, SASN '05.
[13] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[14] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[15] Omar Zakaria,et al. Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard , 2010, ArXiv.
[16] Girija J. Narlikar,et al. Scheduling threads for low space requirement and good locality , 1999, SPAA '99.
[17] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[18] Xiaoyun Wang,et al. SDD: Secure Directed Diffusion Protocol for Sensor Networks , .
[19] Radha Poovendran,et al. Securing Wireless Sensor Networks , 2009 .
[20] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[21] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[22] Yoon-Hwa Choi,et al. A secure alternate path routing in sensor networks , 2006, Comput. Commun..
[23] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[24] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[25] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[26] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[27] Alejandro Quintero,et al. A location routing protocol based on smart antennas for ad hoc networks , 2007, J. Netw. Comput. Appl..