A Neighbor-Based Detection Scheme for wireless sensor networks against node replication attacks
暂无分享,去创建一个
[1] Roberto Di Pietro,et al. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.
[2] Sushil Jajodia,et al. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[3] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[4] Fang Liu,et al. Real-Time Detection of Clone Attacks in Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[5] Thomas F. La Porta,et al. SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[6] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[9] L. El Ghaoui,et al. Convex position estimation in wireless sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[10] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[11] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[12] Xiuzhen Cheng,et al. Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks , 2007, MobiCom '07.
[13] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[14] J. Elson,et al. Fine-grained network time synchronization using reference broadcasts , 2002, OSDI '02.
[15] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[16] Deborah Estrin,et al. GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.
[17] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[18] Maryline Laurent-Maknavicius,et al. A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).
[19] Sergio D. Servetto,et al. Asymptotically optimal time synchronization in dense sensor networks , 2003, WSNA '03.
[20] Deborah Estrin,et al. GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..
[21] James Newsome,et al. GEM: Graph EMbedding for routing and data-centric storage in sensor networks without geographic information , 2003, SenSys '03.