Distributed Detection of Clone Attacks in Wireless Sensor Networks Using Detection Protocols
Abstract
Keywords
Full Text:
PDFReferences
C. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of 2003. IEEE Symposium on Security and Privacy (S&P’03), pages 197–213, 2003.
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS ’02), pages 41–47, 2002.
B. Parno, A. Perrig, and V. D. Gligor. Distributed detection of node replication attacks in sensor networks. In Proceedings of 2005 IEEE Symposium on Security and Privacy (S&P ’05), pages 49–63, 2005.
C. Cocks. An identity based encryption scheme based on quadratic residues. In Proceedings of the 8th IMA International Conference on Cryptography and Coding.
V. D. Gligor. Emergent properties in ad-hoc networks: a security perspective. In Proceedings of the 4th ACM workshop on Wireless security (WiSe ’05), page 55, 2005.pages 360–363, London, UK, 2001. Springer-Verlag.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.