Adaptive security design with malicious node detection in cluster-based sensor networks
暂无分享,去创建一个
Meng-Yen Hsieh | Yueh-Min Huang | Han-Chieh Chao | H. Chao | M. Hsieh | Yueh-Min Huang | Meng-Yen Hsieh
[1] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[2] M. Weber,et al. Sensors for Detection of Misbehaving Nodes in MANETs , 2004, PIK Prax. Informationsverarbeitung Kommun..
[3] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[4] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[5] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[6] Sugata Sanyal,et al. Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks , 2004, IWDC.
[7] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[8] Meng-Yen Hsieh,et al. A Secure On-Demand Routing with Distributed Authentication for Trust-Based Ad Hoc Networks , 2005, NPC.
[9] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[10] A. Manjeshwar,et al. TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[11] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[12] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[13] Cauligi S. Raghavendra,et al. PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.
[14] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[15] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[16] Deep Medhi,et al. Source routing based pairwise key establishment protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[17] Antonio Alfredo Ferreira Loureiro,et al. LHA-SP: secure protocols for hierarchical wireless sensor networks , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..
[18] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[19] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[20] A F LoureiroAntonio,et al. On the design of secure protocols for hierarchical sensor networks , 2007 .
[21] Mingyan Liu,et al. Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[22] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[23] Hasan Çam,et al. Energy-efficient secure pattern based data aggregation for wireless sensor networks , 2006, Comput. Commun..
[24] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[25] J.-Y. Le Boudec,et al. Toward self-organized mobile ad hoc networks: the terminodes project , 2001, IEEE Commun. Mag..
[26] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[27] Stefan Schlott,et al. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.
[28] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[29] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[30] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[31] Jiann-Liang Chen,et al. Cluster based self-organization management protocols for wireless sensor networks , 2006, IEEE Transactions on Consumer Electronics.
[32] Hyunsoo Yoon,et al. Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network , 2005 .
[33] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[34] Hua-Yi Lin,et al. Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks , 2005, IEICE Trans. Commun..
[35] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[36] Ricardo Dahab,et al. On the design of secure protocols for hierarchical sensor networks , 2007, Int. J. Secur. Networks.
[37] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[38] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[39] Antonio Alfredo Ferreira Loureiro,et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.
[40] D.P. Agrawal,et al. APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.
[41] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[42] Ricardo Dahab,et al. SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).