Visualisation of wormholes in underwater sensor networks : a distributed approach
暂无分享,去创建一个
[1] Nitin H. Vaidya,et al. Medium access control protocols using directional antennas in ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[2] Geoffrey G. Xie,et al. A Networking Protocol for Underwater Acoustic Networks , 2000 .
[3] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[4] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[5] David E. Culler,et al. The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.
[6] W. Torgerson,et al. Multidimensional scaling of similarity , 1965, Psychometrika.
[7] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[8] A.B. Baggeroer,et al. The state of the art in underwater acoustic telemetry , 2000, IEEE Journal of Oceanic Engineering.
[9] J. R. V. BROOKS,et al. Earth Science , 1973, Nature.
[10] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[11] Kostas E. Bekris,et al. Robotics-Based Location Sensing Using Wireless Ethernet , 2002, MobiCom '02.
[12] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[13] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[14] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[15] Nitin H. Vaidya,et al. Using directional antennas for medium access control in ad hoc networks , 2002, MobiCom '02.
[16] Dario Pompili,et al. Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.
[17] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[18] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[19] Colin Boyd,et al. Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.
[20] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[21] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[22] Yinyu Ye,et al. Semidefinite programming for ad hoc wireless sensor network localization , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[23] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[24] A. Kaya,et al. An Acoustic Communication System for Subsea Robot , 1989, Proceedings OCEANS.
[25] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[26] V. Rodoplu,et al. An energy-efficient MAC protocol for underwater wireless acoustic networks , 2005, Proceedings of OCEANS 2005 MTS/IEEE.
[27] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[28] Jiejun Kong,et al. Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic applications , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[29] Bharat K. Bhargava,et al. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.
[30] Laura Marie Feeney,et al. An integrated approach to developing sensor network solutions , 2004 .
[31] M. Stojanovic,et al. Underwater acoustic networks , 2000, IEEE Journal of Oceanic Engineering.
[32] Ronald L. Rivest,et al. The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms , 1996, RFC.
[33] Kevin J. Parker,et al. Digital halftoning using a blue-noise mask , 1991, Electronic Imaging.
[34] Chenyang Lu,et al. Priority Scheduling in TinyOS : A Case Study , 2002 .
[35] Jan M. Rabaey,et al. Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks , 2002, USENIX Annual Technical Conference, General Track.
[36] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[37] Lee Freitag,et al. Analysis of channel effects on direct-sequence and frequency-hopped spread-spectrum acoustic communication , 2001 .
[38] Nicolas Sklavos,et al. Low power cryptography , 2005 .
[39] Chris Savarese. LOCATIONING IN DISTRIBUTED AD-HOC WIRELESS SENSOR NETWORKS , 2001 .
[40] Jan M. Rabaey,et al. Location in distributed ad-hoc wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[41] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[42] Kay Römer. Time synchronization in ad hoc networks , 2001, MobiHoc '01.
[43] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[44] Androula G. Nassiopoulou,et al. The Second Conference on Microelectronics, Microsystems and Nanotechnology , 2005 .
[45] Jing Liu,et al. Secure Routing for Mobile Ad Hoc Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[46] Milica Stojanovic,et al. Shallow water acoustic networks , 2001, IEEE Commun. Mag..
[47] Xiang Ji,et al. Sensor positioning in wireless ad-hoc sensor networks using multidimensional scaling , 2004, IEEE INFOCOM 2004.
[48] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[49] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[50] Ying Zhang,et al. Localization from mere connectivity , 2003, MobiHoc '03.
[51] A. Householder,et al. Discussion of a set of points in terms of their mutual distances , 1938 .
[52] Gilles Burel,et al. A chaotic Direct-Sequence Spread-Spectrum system for underwater communication , 2002, OCEANS '02 MTS/IEEE.
[53] Burton S. Kaliski,et al. On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm , 1995, CRYPTO.
[54] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .