Security in Wireless Sensor Networks(无线传感器网络安全)

来源:互联网 发布:java poi怎么用 编辑:程序博客网 时间:2024/05/27 19:28

[1] L. Zhou and Z.J. Haas., Securing Ad Hoc Networks., IEEE Network Special Issue on Network Security., 13, 6, 24-30, November 1999

[2] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar., SPINS: Security Protocols for Sensor Networks., ACM Mobile Computing and Networking, July 2001

[3] A.D. Wood, J.A. Stankovic, and S.H. Son, JAM: A Jammed-Area Mapping Service for Sensor Networks, In The 24th IEEE International Real-Time Systems Symposium (RTSS), December 2003

[4] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, CCS'03, October 2003

[5] C. Yin, S. Huang, P. Su, and C. Gao., Secure Routing for Large-scale Wireless Sensor Networks., In Proc. of International Conference on Communication Technology (ICCT'03), April 2003

[6] J. Deng, R. Han, and S. Mishra., A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks., 2nd International Workshop on Information Processing in Sensor Networks (IPSN 03), April 2003

[7] A.D. Wood and J.A. Stankovic, Denial of Service in Sensor Networks, IEEE Computer, 35, 54-62, September 2002

[8] C. Karlof and D. Wagner., Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures., Sensor Network Protocols and Applications (SNPA'03), May 2003

[9] H. Chan, A. Perrig, and D. Song., Random Key Predistribution Schemes for Sensor Networks., IEEE Symposium on Security and Privacy (SP), May 2003

[10] G. Jolly, M.C. Kuscu, P. Kokate, and M. Younis., A Low-Energy Key Management Protocol for Wireless Sensor Networks., IEEE Symposium on Computers and Communications(ISCC'03)., June 2003

[11] P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu., Analyzing and Modeling Encryption Overhead for Sensor Network Nodes., WSNA'03, September 2003

[12] Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang., Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks., WSNA'03, September 2003

[13] Y.C. Hu, A. Perrig, and D.B. Johnson., Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols., WiSe'03, September 2003

[14] M. Bohge and W. Trappe., An Authentication Framework for Hierarchical Ad Hoc Sensor Networks., WiSe'03, September 2003

[15] R.D. Pietro, L.V. Mancini, Y.W. Law, S. Etalle, and P. Havinga., LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks., 2003 International Conference on Parallel Processing Workshops (ICPPW'03), October 2003

[16] S. Zhu, S. Setia, and S. Jajodia., LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks., CCS'03, October 2003

[17] Y. W. Law, S. Dulman, S. Etalle, and P. Havinga, Assessing Security-Critical Energy-Efficient Sensor Networks, Int. Conf. on Information Security, Security and Privacy in the Age of Uncertainty (SEC), May 2003

[18] B. Przydatek, D. Song, and A. Perrig., SIA: Secure Information Aggregation in Sensor Networks., The First ACM Conference on Embedded Networked Sensor Systems (Sensys03), November 2003

[19] S. Slijepcevic, V. Tsiatsis, and S. Zimbeck, On Communication Security in Wireless Ad-Hoc Sensor Networks, IEEE Eleventh International Workshops on Enabling Technologies, June 2002

[20] Chris Karlof, Naveen Sastry, David Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, ACM Sensys, November 2004

[21] J. Newsome, E. Shi, D. Song and A. Perrig, The sybil attack in sensor networks: analysis & defenses, 3rd International Symposium on Information Processing in Sensor Networks (IPSN '04), April 2004

[22] Malan, D.J.; Welsh, M.; Smith, M.D., A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography, IEEE SECON 2004, October 2004

[23] Martinez, K.; Ong, R.; Hart, J., Glacsweb: a sensor network for hostile environments, IEEE SECON 2004, October 2004

[24] Song Li; Ephremides, A., A Network Layer Covert Channel in Ad-hoc Wireless Networks, IEEE SECON 2004, October 2004

[25] Subhadrabandhu, D.; Sarkar, S.; Anjum, F., Efficacy of Misuse Detection in Adhoc Networks, IEEE SECON 2004, October 2004

[26] W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, INFOCOM'04, March 2004

[27] F. Ye, H. Luo, S. Lu, and L. Zhang, Statistical En-route Filtering of Injected False Data in Sensor Networks, INFOCOM'04, March 2004

[28] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, Toward Resilient Security in Wireless Sensor Networks, ACM Mobihoc, May 2005

[29] W. Du, R. Wang and P. Ning, An Efficient Scheme for Authenticating Public Keys in Sensor Networks, ACM Mobihoc, May 2005

[30] W. Zhang, H. Song, S. Zhu, and G. Cao, Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Se, ACM Mobihoc, March 2005

[31] Anuj Chadha, Yonghe Liu and Sajal K. Das, Group Key Distribution via Local Collaboration in Wireless Sensor Networks, IEEE SECON, September 2005

[32] Wei Yu and K. J. Ray Liu, Secure Cooperative Mobile Ad Hoc Networks Against injecting Traffic Attacks, IEEE SECON, September 2005

[33] Wei Yu and K. J. Ray Liu, Stimulating Cooperation and Defending Against Attacks in Self-Organized Mobile Ad Hoc Networks, IEEE SECON, September 2005

[34] Mohamed Shehab, Elisa Bertino and Arif Ghafoor, Efficient Hierarchical Key Generation and Key Diffusion for Sensor Networks, IEEE SECON, September 2005

[35] Farshid Delgosha and Faramarz Fekri, Key Pre-Distribution on Wireless Sensor Networks Using Multivariate Polynomials, IEEE SECON, September 2005

[36] Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rothermel, A new approach for establishing pairwise keys for securing wireless sensor networks, Sensys 2005, Proceedings of the 3rd ACM Conference on Embedded Networked Sensor Systems, November 2005

[37] Yee Wei Law, Jeroen Doumen, Pieter Hartel, Benchmarking Block Ciphers for Wireless Sensor Networks, IEEE MASS, October 2004

[38] Madhukar Anand, Zachary Ives, Insup Lee, Quantifying Eavesdropping Vulnerability in Sensor Networks, Second International VLDB Workshop on Data Management for Sensor Networks (DMSN 2005), June 2005

[39] Michael Manzo and Tanya Roosta, Time Synchronization Attacks in Sensor Networks, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), August 2005

[40] Yinian Mao and Min Wu, Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), November 2005

[41] Jing Deng, Richard Han, and Shivakant Mishra, Defending against Path-based DoS Attacks in Wireless Sensor Networks, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), November 2005

[42] Takashi Ito, Hidenori Ohta, Nori Matsuda, and Takeshi Yoneda, A Key Pre-Distribution Scheme for Secure Sensor Networks Using Probability Density Function of Node, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), November 2005

[43] Sy, D. Bao, L., CAPTRA: coordinated packet traceback, Proceedings of the Fifth International Conference on Information Processing in Sensor Networks (IPSN, April 2006

[44] Farshid Delgosha, Erman ayday, Kevin Chan, Faramarz Fekri, Security Services in Wireless Sensor Networks Using Sparse Random Coding, IEEE SECON 2006, September 2006

[45] Qing Li, Wade Trappe, Relationship-Based Detection of Spoofing-Related Anomalous Traffic in Ad Hoc Networks, IEEE SECON 2006, September 2006

[46] Wei Zhang, Sajal Das, Yonghe Liu, A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks, IEEE SECON 2006, September 2006

[47] Bo Zhu, Sushil Jajodia, An Anonymous Routing Protocol with The Local-Repair Mechanism for Mobile Ad Hoc Networks, IEEE SECON 2006, September 2006

[48] Farshid Delgosha and F. Fekri, Threshold Key-Establishment in Distributed Sensor Networks Using a Multivariate Scheme, IEEE INFOCOM, April 2006

[49] Matthew J. Miller and Nitin H. Vaidya, Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks, IEEE INFOCOM, April 2006

[50] Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu and Tom La Porta, Establishing Pair-wise Keys in Heterogeneous Sensor Networks, IEEE INFOCOM, April 2006

[51] Li Zhou and Jinfeng Ni and Chinya V. Ravishankar, Supporting Secure Communication and Data Collection in Mobile Sensor Networks, IEEE INFOCOM, April 2006

[52] Srdjan Capkun, Mario Cagalj, Mani Srivastava, Secure Localization With Hidden and Mobile Base Stations, IEEE INFOCOM, April 2006

[53] Kui Ren, Wenjing Lou, Yanchao Zhang, LEDS: Providing Location-aware End-to-end Data Security in Wireless Sensor Networks, IEEE INFOCOM, April 2006

[54] Zhen Yu, Yong Guan, A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks, IEEE INFOCOM, April 2006

[55] Zhiying Yao; Daeyoung Kim; Yoonmee Doh, PLUS: Parameterized and Localized trUst management Scheme for sensor networks security, IEEE Proceedings of MASS 2006, October 2006

[56] Fang Liu; Xiuzhen Cheng, A Self-Configured Key Establishment Scheme for Large-Scale Sensor Networks, IEEE Proceedings of MASS 2006, October 2006

[57] Ida Savino; Gianluca Dini, S2RP: a Secure and Scalable Rekeying Protocol for Wireless Sensor Networks, IEEE Proceedings of MASS 2006, October 2006

[58] Timothy X Brown, Jesse E. James, Amita Sethi, Jamming and sensing of encrypted wireless ad hoc networks, Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing (Mo, May 2006

[59] D. Wang, Q. Zhang, and J. Liu, Self-Protections for Sensor Networks, ICDCS, July 2006

[60] P.E. Lanigan, R. Gandhi, and P. Narasimhan, Sluice: Secure Dissemination of Code Updates in Sensor Networks, ICDCS, July 2006

[61] P. Traynor, R. Kumar, H.B. Saad, G. Cao, and T.L. Porta, LIGER: Implementing Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks, Mobisys, November 2006

[62] A. Wood, J. Stankovic, and G. Zhou, DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks, IEEE Secon, June 2007

[63] K. Ren, W. Lou, and Y. Zhang, Multi-user Broadcast Authentication in Wireless Sensor Networks, IEEE Secon, June 2007

[64] M. Luk, G. Mezzour, A. Perrig, and V. Gligor, MiniSec: A Secure Sensor Network Communication Architecture, IPSN, April 2007

[65] W. Xu, W. Trappe, and Y. Zhang, Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference, IPSN, April 2007

[66] E. Ayday, F. Delgosha, and F. Fekri, Location-Aware Security Services for Wireless Sensor Networks using Network Coding, Infocom, May 2007

[67] M. Shao, S. Zhu, W. Zhang, and G. Cao, pDCS: Security and Privacy Support for Data-Centric Sensor Networks, Infocom, May 2007

[68] M. Li, I. Koutsopoulos, and R. Poovendran, Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks, Infocom, May 2007

[69] F. Liu, X. Cheng, and D. Chen, Insider Attacker Detection in Wireless Sensor Networks, Infocom, May 2007

[70] Y. Jian, S. Chen, Z. Zhang, and L. Zhang, Protecting Receiver-Location Privacy in Wireless Sensor Networks, Infocom, May 2007

[71] Y. Chen, W. Trappe, and R. Martin, Attack Detection in Wireless Localization, Infocom, May 2007 


Related to Wireless Sensor Networks:

  • TinyOS、NesC程序开发经验谈
  • CrossBow公司MIB600基板Mote节点数据的接收(VC++篇)
  • Location in Wireless Sensor Networks_06-07Year(无线传感器网络定位06-07年)
  • Survey on Wireless Sensor Networks(无线传感器网络综述)
  • Hardware on Wireless Sensor Networks(无线传感器网络硬件)
  • Security in Wireless Sensor Networks(无线传感器网络安全)
  • Time Synchronization in Wireless Sensor Networks(无线传感器网络时间同步)
  • Target Tracking in Wireless Sensor Networks(无线传感器网络目标跟踪)
  • Location in Wireless Sensor Networks_1/3(无线传感器网络定位1/3)
  • Location in Wireless Sensor Networks_2/3(无线传感器网络定位2/3)
  • Location on Wireless Sensor Networks_3/3(无线传感器网络定位3/3)
原创粉丝点击