A Survey on Measures for Secure Routing in Wireless Sensor Networks
暂无分享,去创建一个
[1] Norio Nakagawa,et al. SH4 RISC multimedia microprocessor , 1998, IEEE Micro.
[2] Huafeng Wu,et al. Agent-based Trust Model in Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[3] Javier López,et al. Unleashing public-key cryptography in wireless sensor networks , 2006, J. Comput. Secur..
[4] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[5] Cheng Li,et al. Joint data aggregation and encryption using Slepian-Wolf coding for clustered wireless sensor networks , 2010, Wirel. Commun. Mob. Comput..
[6] Jun Wei,et al. Automated Resource Management Framework for Adjusting Business Service Capability , 2007 .
[7] Donggang Liu,et al. Group-based key predistribution for wireless sensor networks , 2008, TOSN.
[8] Falko Dressler,et al. Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[9] Richard T. Witek,et al. StrongARM: a high-performance ARM processor , 1996, COMPCON '96. Technologies for the Information Superhighway Digest of Papers.
[10] Özgür Erçetin,et al. Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario , 2007, Networking.
[11] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[12] Sanjay Jha,et al. The holes problem in wireless sensor networks: a survey , 2005, MOCO.
[13] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[14] Huafeng Wu,et al. Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .
[15] Dirk Westhoff,et al. Security Solutions for Wireless Sensor Networks , 2006 .
[16] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[17] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[18] Jean-Philippe Babau,et al. An Ontology for Attacks in Wireless Sensor Networks , 2007 .
[19] Mischa Dohler,et al. A Security Framework for Routing over Low Power and Lossy Networks , 2012 .
[20] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[21] Baohua Zhao,et al. Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).
[22] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[23] Huafeng Wu,et al. Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[24] Deep Medhi,et al. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks , 2007, TNET.
[25] Fortunato Santucci,et al. Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[26] Marine Minier,et al. Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks , 2007, WISTP.
[27] Huafeng Wu,et al. Event-based Trust Framework Model in Wireless Sensor Networks , 2008, 2008 International Conference on Networking, Architecture, and Storage.
[28] Radha Poovendran,et al. SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.
[29] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[30] Ki-Hyung Kim,et al. A unified security framework with three key management schemes for wireless sensor networks , 2008, Comput. Commun..
[31] Sencun Zhu,et al. A random perturbation-based scheme for pairwise key establishment in sensor networks , 2007, MobiHoc '07.
[32] Elfed Lewis,et al. Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes , 2008 .
[33] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[34] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[35] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[36] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[37] A. Jain,et al. Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[38] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[39] Stamatis Voliotis,et al. An energy and trust-aware routing protocol for large wireless sensor networks , 2009 .
[40] Gene Tsudik,et al. QUEST Software and , 2022 .
[41] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[42] E. Lewis,et al. Power Management in Operating Systems for Wireless Sensor Nodes , 2007, 2007 IEEE Sensors Applications Symposium.
[43] Jin Zhang,et al. Curve-Based Secure Routing Algorithm for Sensor Network , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[44] N. Fisal,et al. Security enhancement for real-time routing protocol in wireless sensor networks , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).
[45] Chun-Shien Lu,et al. A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks , 2008, MobiHoc '08.
[46] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[47] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[48] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[49] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[50] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[51] N. Fisal,et al. Optimal forwarding probability for real-time routing in wireless sensor network , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.
[52] Yoonmee Doh,et al. PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[53] Jin Zhang,et al. Curve-Based Greedy Routing Algorithm for Sensor Networks , 2005, ICCNMC.
[54] Hairong Qi,et al. Revisiting Public-Key Cryptography for Wireless Sensor Networks , 2005, Computer.
[55] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[56] Donggang Liu,et al. Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.
[57] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[58] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[59] Deep Medhi,et al. Modeling Pairwise Key Establishment for Random Key Predistribution in Large-Scale Sensor Networks , 2007, IEEE/ACM Transactions on Networking.
[60] Gourab Sen Gupta,et al. Smart Sensors and Sensing Technology , 2008 .
[61] Rajashekhar C. Biradar,et al. A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[62] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[63] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[64] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[65] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[66] Young-Koo Lee,et al. Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks , 2009, ICUIMC '09.
[67] I. Mahgoub,et al. A Secure Hierarchical Routing Protocol for Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[68] Kyung Jun Choi,et al. Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.
[69] Eylem Ekici,et al. Secure probabilistic location verification in randomly deployed wireless sensor networks , 2008, Ad Hoc Networks.
[70] Debao Xiao,et al. Secure-SPIN: Secure Sensor Protocol for Information via Negotiation for Wireless Sensor Networks , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.
[71] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..