共 9 条
[1]
Detecting selective forwarding attacks in wirelesssensor networks. Yu B,Xiao B. Proceedings of the 2nd InternationalWorkshop on Security in Systems and Networks(IPDPS2006Workshop) . 2006
[2]
GPSR: Greedy Perimeter Stateless Routing For Wireless Ad Hoc Networks. Karp B,Kung H T. Proceeding of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM) . 2000
[3]
Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures. KadofC,WagnerD. First IEEE International Workshop on Sensor Network Protocols and Applications . 2003
[4]
An interleaved hop-by-hop authentication scheme for filtering of injected false datain sensor networks. Zhu S,Setia S,Jajodia S,Peng N. Proceedings of the IEEE Symposiumon Security and Privacy . 2004
[5]
Toward re-silient security in wireless sensor networks. Yang H,Ye F,Yuan Y,Lu S,Arbaugh W. Proceedings ofthe ACM MobiHoc 2005 . 2005
[6]
Directed diffu-sion:A scalable and robust communication paradigm for sensornetworks. Intanagonwiwat C,Govindan R,Estrin D. Proceedings of the ACM MobiCom 2000 . 2000
[7]
Constructing digital signatures from a one-wayfunction. L Lamport. . 1979
[8]
PSFQ:A Reliable Transport Protocol for Wireless Sensor Networks. W.Chieh-Yih,,C.T.Andrew,,K.Lakshman. Proceedings of the 1 st ACM international worksh op on Wireless sensor networks and applications . 2002
[9]
SPINS:security protocols for sensor networks. Adrian Perrig,Robert Szewezyk,Victor Wen,David Culler,J D.Tygar. Proceedings of the 7th annual international conference on Mobile computing and networking . 2001