Secure and ultra-reliable provenance recovery in sparse networks: Strategies and performance bounds
Tài liệu tham khảo
Li, 2018, Spatio-temporal compressive sensing-based data gathering in wireless sensor networks, IEEE Wireless Commun. Lett., 7, 198, 10.1109/LWC.2017.2764899
Salhi, 2009, A new architecture for data collection in vehicular networks, 1
Shen, 2004, Wireless sensor networks for industrial applications, 3636
Raya, 2006, Securing vehicular communications, IEEE Wirel. Commun., 13, 8, 10.1109/WC-M.2006.250352
Hameed, 2017, Secure provenance in wireless sensor networks - a survey of provenance schemes, 11
Hasan, 2009, The case of the fake picasso: Preventing history forgery with secure provenance, 1
Sultana, 2012, A lightweight secure provenance scheme for wireless sensor networks, 101
Čapkun, 2003, Sector: secure tracking of node encounters in multi-hop wireless networks, 21
Whitehouse, 2006, A robustness analysis of multi-hop ranging-based localization approximations, 317
Jagadeesh, 2020, Double-edge embedding based provenance recovery for low-latency applications in wireless networks, IEEE Trans. Dependable Secure Comput., 10.1109/TDSC.2020.3001185
Wisitpongphan, 2007, Routing in sparse vehicular ad hoc wireless networks, IEEE J. Sel. Areas Commun., 25, 1538, 10.1109/JSAC.2007.071005
B. Deb, S. Bhatnagar, B. Nath, A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management, Dept. Comput. Sci. Rutgers Univ. Tech. Rep. DCS-TR-441, 2001.
Jawhar, 2017, Efficient topology discovery and routing in thick wireless linear sensor networks, 91
Donnet, 2005, Improved algorithms for network topology discovery, 149
Yu, 2018, Cloud-orchestrated physical topology discovery of large-scale IoT systems using UAVs, IEEE Trans. Ind. Inf., 14, 2261, 10.1109/TII.2018.2796499
Yu, 2016, Physical topology discovery scheme for wireless sensor networks using random walk process, 1
Dhanapala, 2014, Topology preserving maps—extracting layout maps of wireless sensor networks from virtual coordinates, IEEE/ACM Trans. Netw., 22, 784, 10.1109/TNET.2013.2263254
Nezhad, 2008, Efficient topology discovery for multihop wireless sensor networks, 358
Tanabe, 2012, An impersonation attack detection method using bloom filters and dispersed data transmission for wireless sensor networks, 767
Xu, 2011, Traceback in wireless sensor networks with packet marking and logging, Front. Comput. Sci. China, 5, 10.1007/s11704-011-0361-y
Shebaro, 2012, Demonstrating a lightweight data provenance for sensor networks, 1022
Sultana, 2015, A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks, IEEE Trans. Dependable Secure Comput., 12, 256, 10.1109/TDSC.2013.44
Sultana, 2011, A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks, 332
Klonowski, 2018, Light-weight and secure aggregation protocols based on bloom filters, Comput. Secur., 72, 107, 10.1016/j.cose.2017.08.015
Alam, 2014, A practical approach for provenance transmission in wireless sensor networks, Ad Hoc Netw., 16, 28, 10.1016/j.adhoc.2013.12.001
Tanabe, 2013, A path authenticating method using bloom filters against impersonation attacks on relaying nodes for wireless sensor networks, 357
Mao, 2013, Connectivity of large wireless networks under a general connection model, IEEE Trans. Inf. Theor., 59, 1761, 10.1109/TIT.2012.2228894
Reis, 2014, Deploying roadside units in sparse vehicular networks: What really works and what does not, IEEE Trans. Veh. Technol., 63, 2794, 10.1109/TVT.2013.2292519
Goodrich, 2008, Probabilistic packet marking for large-scale ip traceback, IEEE/ACM Trans. Netw., 16, 15, 10.1109/TNET.2007.910594
Sy, 2006, Captra: Coordinated packet traceback, 152
Zhang, 2007, Contact-based traceback in wireless sensor networks, 2487
Wang, 2022, Network temperature: A novel statistical index for networks measurement and management, ACM Trans. Internet Technol., 22, 10.1145/3511093
Wu, 2022, Paradise: real-time, generalized, and distributed provenance-based intrusion detection, IEEE Trans. Dependable Secure Comput., 1
Xu, 2021, Stepwise refinement provenance scheme for wireless sensor networks, IEEE Internet Things J., 1
3GPP TS38.211, NR; Physical Channels and Modulation (v15.3.0, Sept.2018).
Perkins, 1999, Ad-hoc on-demand distance vector routing, 90
Hu, 2006, Wormhole attacks in wireless networks, IEEE J. Sel. Areas Commun., 24, 370, 10.1109/JSAC.2005.861394
Han, 2014, A general self-organized tree-based energy-balance routing protocol for wireless sensor network, IEEE Trans. Nucl. Sci., 61, 732, 10.1109/TNS.2014.2309351
Xu, 2016, Device fingerprinting in wireless networks: Challenges and opportunities, IEEE Commun. Surv. Tutor., 18, 94, 10.1109/COMST.2015.2476338