Dynamic Security in Wireless Networks by Using Multiple Path Routing Algorithm
Abstract
Keywords
Full Text:
PDFReferences
Tao Shu, Marwan Krunz, and Sisi Liu, “Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes“ IEEE TRANSACTIONS on mobile computing, vol. 9, no. 7, july 2010
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002
T. Claveirole, M.D. de Amorim, M. Abdalla, and Y. Viniotis,“Securing Wireless Sensor Networks Against Aggregator Compromises,” IEEE Comm. Magazine, vol. 46, no. 4, pp. 134-141, Apr.2008.
P.C. Lee, V. Misra, and D. Rubenstein, “Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks,” IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 1490-1501, Dec. 2007.
W. Lou, W. Liu, and Y. Fang, “Spread: Enhancing Data Confidentiality in Mobile Ad Hoc Networks,” Proc. IEEE INFOCOM, vol. 4, pp. 2404-2413, Mar. 2004.
K. Ren, W. Lou, and Y. Zhang, “LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks,” Proc.IEEE INFOCOM, 2006.
D.R. Stinson, Cryptography, Theory and Practice. CRC Press, 2006.
B. Vaidya, J.Y. Pyun, J.A. Park, and S.J. Han, “Secure Multipath Routing Scheme for Mobile Ad Hoc Network,” Proc. IEEE Int’l Symp. Dependable, Autonomic and Secure Computing, pp. 63-171, 2007.
A.D. Wood and J.A. Stankovic, “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
Yang, F. Ye, Y. Yuan, S. Lu, H. and W. Arbaugh, “Toward Resilient Security in Wireless Sensor Networks,” Proc. ACM MobiHoc, 2005.
Z. Ye, V. Krishnamurthy, and S.K. Tripathi, “A Framework for Reliable Routing in Mobile Ad Hoc Networks,” Proc. IEEE INFOCOM, vol. 1, pp. 270-280, Mar. 2003.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.