Security Issues and Challenges in Event-Driven Wireless Sensor Networks
暂无分享,去创建一个
Lei Shi | Qi Zou | Guang Yang | Lu Lu Liang
[1] Ertan Onur,et al. WIRELESS SENSOR NETWORKS FOR SECURITY: ISSUES AND CHALLENGES , 2006 .
[2] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[3] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[4] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[5] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[6] Oliver W. W. Yang,et al. Efficient Event Detecting Protocol in Event-Driven Wireless Sensor Networks , 2011, IEEE Sensors Journal.
[7] Mohit Saxena,et al. SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .
[8] Mun Choon Chan,et al. Information Quality Aware Routing in Event-Driven Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[9] Deborah Estrin,et al. Dimensions: why do we need a new data handling architecture for sensor networks? , 2003, CCRV.
[10] Özgür B. Akan,et al. A real-time and reliable transport (RT) 2 protocol for wireless sensor and actor networks , 2008, IEEE/ACM Trans. Netw..
[11] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[12] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[13] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[14] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[15] Victor C. M. Leung,et al. A Novel Reliable Transmission Protocol for Urgent Information in Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[16] Yi Pan,et al. Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[17] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[18] Wenke Lee,et al. Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.
[19] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[20] Andreas Willig,et al. Protocols and Architectures for Wireless Sensor Networks , 2005 .
[21] Weisong Shi,et al. Analysis of ratings on trust inference in open environments , 2008, Perform. Evaluation.
[22] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[23] Rachid Beghdad,et al. Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.
[24] Sungyoung Lee,et al. Securing Distributed Wireless Sensor Networks: Issues and Guidelines , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).