1 |
B. Blum, T. He, S. Son, and J. Stankovic, "IGF: A state-free robust communication protocol for wireless sensor networks," Technical Report CS-2003-11, University of Virginia, Charlottesville, VA, 2003.
|
2 |
A. D. Wood, L. Fang, J. Stankovic and T. He, "SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks," Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 35-48, 2006
|
3 |
J. Deng and Y. S. Han, "Using MDS codes for the key establishment of wireless sensor networks," in LNCS 3794. Berlin, Germany: Springer-Verlag, 2005, pp. 732-744.
|
4 |
Q. Dong and D. Liu, "Using auxiliary sensors for pairwise key establishment in WSN," in Proceedings of IFIP International Conference Networks, 2007, pp. 251-262.
|
5 |
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yungand, "Perfectly-secure key distribution for dynamic conferences," Proceedings of Crypto, 1992, pp. 471-486.
|
6 |
W. R. Heinzelman A. Ch and H. Balakrishnan, "Energy efficient communication protocol for wireless microsensor networks," Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 3005-3014, 2000.
|
7 |
A. Boonsongsrikul, K. Lhee and S. K. Park., "Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator ata AggregatSensor Networks," Journal of Korea Information Procegaing Society, vol. 18-c, No. 5, pp 303-316, 2011.
|
8 |
A. Boonsongsrikul, S. K. Park and S. H. Shin., "An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network," Journal of Korea Society of Computer and Information, vol. 16, No. 10, pp. 121-129, 2011.
과학기술학회마을
DOI
|
9 |
S. Ozdemir and H. Cam., "Integration of False Data Detection with Data Aggregation and Confidential Transmission in Wireless Sensor Networks," IEEE/ACM Transactions on Networking, Vol.18 No.3, pp. 736-749, 2010.
DOI
ScienceOn
|
10 |
A. Boonsongsrikul, K. Lhee and M. Hong, "Securing Data Aggregation against False Data Injection in Wireless Sensor Networks," Proceedings of the 12th International Conference on Advanced Communi cation Technology (ICACT'2010), pp. 29-34, 2010
|
11 |
A. De Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz and H. C. Wong, "Decentralized Intrusion Detection in Wireless Sensor Networks," Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 16-23, 2005
|