Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks
暂无分享,去创建一个
[1] John A. Stankovic,et al. Radio-triggered wake-up capability for sensor networks , 2004, Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and Applications Symposium, 2004..
[2] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[3] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Jan M. Rabaey,et al. Low power distributed MAC for ad hoc sensor radio networks , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[5] L.E. Larson,et al. Passive RF Receiver Design for Wireless Sensor Networks , 2007, 2007 IEEE/MTT-S International Microwave Symposium.
[6] Michael S. Hsiao,et al. Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[7] Paramvir Bahl,et al. Wake on wireless: an event driven energy saving strategy for battery operated devices , 2002, MobiCom '02.
[8] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[9] Gregory M. P. O'Hare,et al. Multi-Hop RFID Wake-Up Radio: Design, Evaluation and Energy Tradeoffs , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.
[10] Ram Ramanathan,et al. JAVeLEN - An ultra-low energy ad hoc wireless network , 2008, Ad Hoc Networks.
[11] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[12] Nitin H. Vaidya,et al. A MAC protocol to reduce sensor network energy consumption using a wakeup radio , 2005, IEEE Transactions on Mobile Computing.
[13] Mahmut T. Kandemir,et al. The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.
[14] Gregory M. P. O'Hare,et al. On the RFID Wake-up Impulse for Multi-hop Sensor Networks , 2007 .
[15] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.