Authentic delay bounded event detection in heterogeneous wireless sensor networks
Tài liệu tham khảo
H. Hou, C. Corbett, Y. Li, R. Beyah, Dynamic energy-based encoding and filtering in sensor networks, in: 2007 Military Communications Conference (MILCOM 2007), Orlando, FL, October 29–31, 2007.
A.V.U. Phani Kumar, V. Adi Mallikarjuna Reddy, D. Janakiram, Distributed collaboration for event detection in wireless sensor networks, in: Proceedings of the 3rd International Workshop on Middleware for Pervasive and Ad-hoc Computing, New York, USA, 2005, ACM Press, New York, pp. 1–8.
K. Römer, F. Mattern, Event-based systems for detecting real-world states with sensor networks: a critical analysis, in: DEST Workshop on Signal Processing in Sensor Networks at ISSNIP, Melbourne, Australia, December 2004, pp. 389–395.
T.W. Chim, Along & across algorithm for routing events and queries in wireless sensor networks, in: Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2005), 13–16 December 2005, pp. 725–728.
Intanagonwiwat, 2000, Directed diffusion: a scalable and robust communication paradigm for sensor networks, 56
C.T. Vu, R. Beyah, Y. Li, Composite event detection in wireless sensor networks, in: 26th IEEE International Performance Computing and Communications Conference (IPCCC 2007), New Orleans, LA, 11–13 April 2007.
Y. Zhu, Y. Liu, L.M. Ni, Z. Zhang, Low-power distributed event detection in wireless sensor networks, in: Proceedings of 26th IEEE International Conference on Computer Communications (INFOCOM 2007), May 2007, pp. 2401–2405.
C. Karlof, N. Sastry, D. Wagner, Tinysec: A link layer security architecture for wireless sensor networks, in: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, November 2004, pp. 162–175.
H. Sikkil, M. Soini, P. Oksa, L.S. Heimo, M. Kivikoski, Kilavi wireless communication protocol for the building environment & #8211; security issues, in: 2006 IEEE Tenth International Symposium on Consumer Electronics (ISCE 2006), 2006, pp. 1–6.
Du, 2005, A pairwise key predistribution scheme for wireless sensor networks, ACM Transactions on Information and System Security, 8, 228, 10.1145/1065545.1065548
Chen, 2005, A bootstrapping scheme for inter-sensor authentication within sensor networks, IEEE Communications Letters, 9, 945, 10.1109/LCOMM.2005.10010
W. Du, R. Wang, P. Ning, An efficient scheme for authenticating public keys in sensor networks, in: Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc), New York, USA, 2005, pp. 58–67.
C. Kuo, Y. Lu, A. Pang, T. Kuo, Security enhanced data delivery in sensor networks, in: 39th Annual 2005 International Carnahan Conference on Security Technology (CCST 2005), 11–14 October 2005, pp. 256–259.
Md. Mokammel Haque, A.-S.K. Pathan, B.G. Choi, C.S. Hong, An efficient PKC-based security architecture for wireless sensor networks, in: Military Communications Conference, 2007 – MILCOM 2007, 29–31 October 2007, IEEE Press, New York, pp. 1–7.
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003, pp. 113–127.
Du, 2006, Secure cell relay routing protocol for sensor networks: research articles, Wireless Communications Mobile Computing, 6, 375, 10.1002/wcm.402
B. Parno, M. Luk, E. Gaustad, A. Perrig, Secure sensor network routing: a clean-slate approach, in: Conference on Future Networking Technologies (CoNEXT), December 2006.
F. Ye, H. Luo, S. Lu, L. Zhang, Statistical en-route filtering of injected false data in sensor networks, in: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004), 7–11 March 2004, vol. 4, pp. 2446–2457.
L. Zhang, A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing, in: Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing (IWCMC 2006), New York, USA, 2006, ACM Press, New York, pp. 33–38.
J. Yin, S.K. Madria, Secrout: A secure routing protocol for sensor networks, in: Advanced Information Networking and Applications (AINA 2006), 2006, pp. 393–398.
Crossbow MIB and Stargate gateway nodes, <http://www.xbow.com> (accessed: 10.11.07).
Password Recovery Speeds, <http://www.lockdown.co.uk/?pg=combi> (accessed: 10.11.07).
S.A. Camtepe, B. Yener, Key distribution mechanisms for wireless sensor networks: a survey, Technical Report TR-05-07, Rensselaer Polytechnic Institute, Computer Science Department, March 2005.