On the Node Clone Detection in Wireless Sensor Networks
暂无分享,去创建一个
[1] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[2] Thomas F. La Porta,et al. SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[3] Sushil Jajodia,et al. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[4] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[5] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[6] Gade Krishna,et al. A scalable peer-to-peer lookup protocol for Internet applications , 2012 .
[7] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[8] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[9] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[10] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[11] Mahmut T. Kandemir,et al. On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[12] Radha Poovendran,et al. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks , 2006, Advances in Information Security.
[13] David R. Karger,et al. Looking up data in P2P systems , 2003, CACM.
[14] Abdalkarim Awad,et al. Virtual Cord Protocol (VCP): A flexible DHT-like routing service for sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[15] András Varga,et al. An overview of the OMNeT++ simulation environment , 2008, SimuTools.
[16] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[17] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.