Protecting an WSN from internal attack based on epistemic uncertainties
暂无分享,去创建一个
[1] Bruno Sinopoli,et al. Distributed control applications within sensor networks , 2003, Proc. IEEE.
[2] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[3] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[4] D. Stephens,et al. Detection of moving radioactive sources using sensor networks , 2004, IEEE Transactions on Nuclear Science.
[5] Xu Huang,et al. Fuzzy controlling window for elliptic curve cryptography in wireless networks , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[6] Pavan Sikka,et al. Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[7] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[8] Xu Huang,et al. A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks , 2011, 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing.
[9] J. C. Helton,et al. Uncertainty and sensitivity analysis in the presence of stochastic and subjective uncertainty , 1997 .
[10] Chung-Kuo Chang,et al. An application of sensor networks for syndromic surveillance , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..
[11] Dharmendra Sharma,et al. Accuracy of Location Identification with Antenna Polarization on RSSI , 2009 .
[12] Yong Guan,et al. An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[13] Xu Huang,et al. Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.
[14] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[15] Matt Welsh,et al. Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.
[16] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[17] Balasubramaniam Natarajan,et al. Optimal Control-Based Strategy for Sensor Deployment , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[18] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[19] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[20] Kamal Jain,et al. Signatures for Network Coding , 2006 .
[21] Fabrice Valois,et al. Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.
[22] Pritam Gajkumar Shah,et al. Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography , 2010 .
[23] Feng Zhao. Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[24] Hyuk Lim,et al. J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.