Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks
暂无分享,去创建一个
[1] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[2] P. Varaiya,et al. Fault tolerance and energy efficiency of data aggregation schemes for sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[3] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[4] Shahram Latifi,et al. On Reliability Concerns in Wireless Sensor Networks , 2004, International Conference on Parallel and Distributed Processing Techniques and Applications.
[5] S. Sitharama Iyengar,et al. Functional characterization of fault tolerant integration in distributed sensor networks , 1991, IEEE Trans. Syst. Man Cybern..
[6] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[7] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[8] H.E. Michel,et al. Integrated modeling for wireless sensor networks reliability and security , 2006, RAMS '06. Annual Reliability and Maintainability Symposium, 2006..
[9] M. Potkonjak,et al. Fault tolerance techniques for wireless ad hoc sensor networks , 2002, Proceedings of IEEE Sensors.
[10] Thomas F. La Porta,et al. The effects of probabilistic key management on secure routing in sensor networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[11] Deborah Estrin,et al. Rumor routing algorthim for sensor networks , 2002, WSNA '02.
[12] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[13] Kuang-Ching Wang,et al. Value-Fusion versus Decision-Fusion for Fault-tolerance in Collaborative Target Detection in Sensor Networks , 2001 .
[14] Deborah Estrin,et al. Rumor Routing Algorithm For Sensor Networks , 2002 .
[15] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[16] Peter Y. A. Ryan,et al. Architectural Analysis of MAFTIA's Intrusion Tolerance Capabilities , 2003 .
[17] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[18] Yaping Li,et al. ARRIVE: Algorithm for Robust Routing in Volatile Environments , 2003 .
[19] S. Sitharama Iyengar,et al. Functional characterization of sensor integration in distributed sensor networks , 1991, [1991] Proceedings. The Fifth International Parallel Processing Symposium.
[20] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .
[21] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[22] Antonio Alfredo Ferreira Loureiro,et al. LHA-SP: secure protocols for hierarchical wireless sensor networks , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..
[23] Arunabha Sen,et al. A new metric for fault-tolerance in sensor networks , 2004, SenSys '04.
[24] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[25] Martina Zitterbart,et al. Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.
[26] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[27] Ahmed Helmy,et al. Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.
[28] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[29] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[30] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[31] Yunghsiang Sam Han,et al. A combined decision fusion and channel coding scheme for fault-tolerant classification in wireless sensor networks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[32] Christian Bettstetter,et al. Connectivity of Wireless Multihop Networks in a Shadow Fading Environment , 2005, Wirel. Networks.
[33] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[34] Sushil Jajodia,et al. LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.
[35] Yunghsiang Sam Han,et al. A combined decision fusion and channel coding scheme for distributed fault-tolerant classification in wireless sensor networks , 2006, IEEE Transactions on Wireless Communications.
[36] P. Djukic,et al. Minimum energy fault tolerant sensor networks , 2004, IEEE Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004..
[37] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[38] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[39] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[40] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[41] Keith Marzullo,et al. Tolerating failures of continuous-valued sensors , 1990, TOCS.
[42] Abdel Aitouche,et al. Sensor network design for fault tolerant estimation , 2004 .
[43] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.