1 |
A. Boonsongsrikul and et al., "Securing Data Aggregation against False Data Injection attacks in Wireless Sensor Networks," ICACT 2010, pp.29-34, 2010.
|
2 |
H. Chan and A. Perrig, "PIKE: Peer Intermediaries for Key Establishment in Sensor Network," IEEE INFOCOM 2005, pp.524-535, 2005.
|
3 |
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," Proc. of IEEE Symposium on Security and Privacy, May, 2003.
|
4 |
H. Chan, V. Gligor, A. Perrig, and G. Muralidharan, "On the distribution and revocation of cryptographic keys in sensor networks," IEEE Transactions on Dependable and Secure Computing, Vol.2, No.3, pp.233-247, July-Sept., 2005.
DOI
ScienceOn
|
5 |
Da Silva and et al., "Decentralized Intrusion Detection in Wireless Sensor Networks," Q2SWinet '05, pp.16-23, 2005.
DOI
|
6 |
S. Zou and et al., "ENCAST: EnergyCritical Node Aware Spanning Tree for Sensor Networks," CNSR, pp.249-254, 2005.
|
7 |
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in CCS '02: Proc. of the 9th ACM conference on Computer and Communications Security, pp.41-47, 2002.
|
8 |
E. Mlaih and et al., "Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks," IEEE INFOCOM, pp.1-6, 2008.
|
9 |
W. R. Heinzelman and et al., "Energy efficient communication protocol for wireless microsensor networks," Proc. of the 33rd Hawaii Int. Conf. on System Sciences, pp.3005-3014, 2000.
|
10 |
S. Madden and et al., "TAG: aTiny AGgregation service for ad-hoc sensor networks," OSDI'02, 2002, pp.1-16, 2002.
DOI
|
11 |
A. Perrig, R. and et al., "SPINS: security protocols for sensor networks," ACM SIGMOBILE, pp.189-199, 2001.
|
12 |
H. Vu and et al., "THIS: THreshold security for Information aggregation in Sensor networks," ITNG'07, pp.89-95, 2007.
|
13 |
B. Przydatek and et al., "SIA: Secure information Aggregation in Sensor Networks," SenSys' 03, pp.255-265, 2003.
DOI
|
14 |
J. R. Taylor, An Introduction to Error Analysis. 2nd edition. Sausolito, California: University Science Books. 1997.
|
15 |
The Network Simulator-ns-2 [Online], Available: http://www.isi.edu/nsnam/ns/
|
16 |
Y. Yang and et al, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," MobiHoc'06, pp. 356-367, 2006.
DOI
|