Protecting from Inside Attacks in Wireless Sensor Networks
暂无分享,去创建一个
[1] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[2] Xu Huang,et al. Fuzzy controlling window for elliptic curve cryptography in wireless networks , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[3] Pavan Sikka,et al. Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[4] Balasubramaniam Natarajan,et al. Optimal Control-Based Strategy for Sensor Deployment , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[5] Fabrice Valois,et al. Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.
[6] Pritam Gajkumar Shah,et al. Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography , 2010 .
[7] Feng Zhao. Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[8] Hyuk Lim,et al. J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.
[9] Yong Guan,et al. An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[11] Kamal Jain,et al. Signatures for Network Coding , 2006 .
[12] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[13] Matt Welsh,et al. Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.
[14] Chung-Kuo Chang,et al. An application of sensor networks for syndromic surveillance , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..
[15] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[16] D. Stephens,et al. Detection of moving radioactive sources using sensor networks , 2004, IEEE Transactions on Nuclear Science.
[17] Xu Huang,et al. Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.
[18] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[19] Bruno Sinopoli,et al. Distributed control applications within sensor networks , 2003, Proc. IEEE.
[20] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.