Wireless Sensor Network Reliability and Security in Factory Automation: A Survey
暂无分享,去创建一个
[1] Tohru Kikuno,et al. A routing protocol for finding two node-disjoint paths in computer networks , 1995, Proceedings of International Conference on Network Protocols.
[2] J.H. Taylor,et al. An Intelligent Architecture for Integrated Control and Asset Management for Industrial Processes , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..
[3] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[4] Xianbin Wang,et al. Continuous Physical Layer Authentication Using a Novel Adaptive OFDM System , 2011, 2011 IEEE International Conference on Communications (ICC).
[5] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[6] Mark D. Yarvis,et al. Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea , 2005, SenSys '05.
[7] Sencun Zhu,et al. Sensor node compromise detection: the location perspective , 2007, IWCMC.
[8] Andreas Willig. Wireless sensor networks: concept, challenges and approaches , 2006, Elektrotech. Informationstechnik.
[9] R. Gadh,et al. Wireless Industrial Monitoring and Control Using a Smart Sensor Platform , 2007, IEEE Sensors Journal.
[10] MengChu Zhou,et al. Ad hoc network routing and security: A review , 2007, Int. J. Commun. Syst..
[11] Venkata M. Mulpuru,et al. Detecting selective forwarding attacks in wireless sensor networks , 2008 .
[12] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[13] Kay Römer,et al. Wireless sensor networks: a new regime for time synchronization , 2003, CCRV.
[14] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[15] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[16] Andreas Willig,et al. Wireless Technology in Industrial Networks , 2005, Proceedings of the IEEE.
[17] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[18] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[19] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[20] Andreas Willig,et al. Recent and Emerging Topics in Wireless Industrial Communications: A Selection , 2008, IEEE Transactions on Industrial Informatics.
[21] Bhaskaran Raman,et al. WiBeaM:Wireless Bearing Monitoring System , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.
[22] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[23] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[24] G. L. Gbur,et al. Wireless vibration monitoring in a US coal-fired plant , 2006 .
[25] Magnus Jonsson,et al. Exploiting time and frequency diversity in IEEE 802.15.4 industrial networks for enhanced reliability and throughput , 2010, 2010 IEEE 15th Conference on Emerging Technologies & Factory Automation (ETFA 2010).
[26] Matthias Hollick,et al. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives , 2010, Future Internet.
[27] Gregory J. Pottie,et al. Principles of Embedded Networked Systems Design: Acknowledgments , 2005 .
[28] Parameswaran Ramanathan,et al. Evaluating Dynamic Failure Probability for Streams with (m, k)-Firm Deadlines , 1997, IEEE Trans. Computers.
[29] T.G. Habetler,et al. Energy evaluation goes wireless , 2007, IEEE Industry Applications Magazine.
[30] MengChu Zhou,et al. A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.
[31] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[32] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[33] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[34] Hung-Min Sun,et al. An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[35] Anna N. Kim,et al. When HART goes wireless: Understanding and implementing the WirelessHART standard , 2008, 2008 IEEE International Conference on Emerging Technologies and Factory Automation.
[36] Paul K. Wright,et al. Distributed Monitoring of Steady-State System Performance Using Wireless Sensor Networks , 2004 .
[37] Jean-Dominique Decotignie. Interconnection of Wireline and Wireless Fieldbusses , 2005, The Industrial Information Technology Handbook.
[38] Chiu-Ching Tuan,et al. Fault Tolerance by Quartile Method in Wireless Sensor and Actor Networks , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[39] P. Neumann,et al. Measurement, analysis and modeling of real-time source data traffic in factory communication systems , 2000, 2000 IEEE International Workshop on Factory Communication Systems. Proceedings (Cat. No.00TH8531).
[40] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[41] L. V. Doorn,et al. SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.
[42] Gang Zhao,et al. Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey , 2011, Netw. Protoc. Algorithms.
[43] Dawn M. Tilbury,et al. The Emergence of Industrial Control Networks for Manufacturing Control, Diagnostics, and Safety Data , 2007, Proceedings of the IEEE.
[44] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[45] Insup Lee,et al. Sensor Network Security: More Interesting Than You Think , 2006, HotSec.
[46] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[47] Jean-Pierre Thomesse,et al. Fieldbus Technology in Industrial Automation , 2005, Proceedings of the IEEE.
[48] Pietro Michiardi,et al. Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .
[49] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[50] Parameswaran Ramanathan,et al. A Dynamic Priority Assignement Technique for Streams with (m, k)-Firm Deadlines , 1995, IEEE Trans. Computers.
[51] Tae Ho Cho,et al. Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks , 2007, UIC.
[52] Robert Tappan Morris,et al. Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.
[53] Leonidas J. Guibas,et al. Wireless sensor networks - an information processing approach , 2004, The Morgan Kaufmann series in networking.
[54] Jens B. Schmitt,et al. Heterogeneous Network Quality of Service Systems , 2001 .
[55] Meng Joo Er,et al. Wireless Sensor Networks for Industrial Environments , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).
[56] Hai Lin,et al. A New Adaptive OFDM System with Precoded Cyclic Prefix for Dynamic Cognitive Radio Communications , 2011, IEEE Journal on Selected Areas in Communications.
[57] Marek Miskowicz,et al. Modeling end-to-end reliability in best-effort networked embedded systems , 2010, 2010 IEEE 15th Conference on Emerging Technologies & Factory Automation (ETFA 2010).
[58] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[59] Mengchu Zhou,et al. An experimental study of interference impacts on ZigBee-based wireless communication inside buildings , 2010, 2010 IEEE International Conference on Mechatronics and Automation.
[60] Ronald L. Rivest,et al. The RC4 encryption algorithm , 1992 .
[61] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[62] Daming Lin,et al. A review on machinery diagnostics and prognostics implementing condition-based maintenance , 2006 .
[63] Paul K. Wright,et al. Condition Monitoring in End-Milling Using Wireless Sensor Networks (WSNs) , 2008 .
[64] T. Newe,et al. Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).
[65] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[66] Richard Zurawski,et al. The Industrial Communication Technology Handbook , 2005 .
[67] Carlo Fischione,et al. Breath: An Adaptive Protocol for Industrial Control Applications Using Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.
[68] Srdjan Capkun,et al. Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..
[69] Amiya R Mohanty,et al. Estimation of tool wear during CNC milling using neural network-based sensor fusion , 2007 .
[70] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[71] Dharma P. Agrawal,et al. Achieving Fault Tolerance in Data Aggregation in Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[72] Xianbin Wang,et al. Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[73] Shlomo Shamai,et al. Information theoretic considerations for cellular mobile radio , 1994 .
[74] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[75] Paul K. Wright,et al. A Wireless Sensor for Tool Temperature Measurement and its Integration within a Manufacturing System , 2006 .
[76] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[77] M. Antoniou,et al. Wireless sensor networks for industrial processes , 2009, 2009 IEEE Sensors Applications Symposium.
[78] Sajal K. Das,et al. Security in Wireless Sensor Networks: A Survey , 2006 .
[79] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[80] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[81] Anke Xue,et al. Reliable Application of Wireless Sensor Networks in Industrial Process Control , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[82] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[83] Gregory J. Pottie,et al. Principles of Embedded Networked Systems Design , 2005 .
[84] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[85] Andreas Willig,et al. Protocols and Architectures for Wireless Sensor Networks , 2005 .
[86] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[87] Youxian Sun,et al. Wireless sensor networks solutions for real time monitoring of nuclear power plant , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).