[图书][B] Principles of wireless sensor networks

MS Obaidat, S Misra - 2014 - books.google.com
Wireless sensor networks are an emerging technology with a wide range of applications in
military and civilian domains. The book begins by detailing the basic principles and …

[PDF][PDF] A comparison of physical attacks on wireless sensor networks

S Mohammadi, H Jadidoleslamy - … Journal of Peer to Peer Networks, 2011 - academia.edu
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique
challenges. They usually consist of hundreds or thousands small sensor nodes such as …

Practical and secure multidimensional query framework in tiered sensor networks

CM Yu, YT Tsou, CS Lu, SY Kuo - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
The two-tier architecture consisting of a small number of resource-abundant storage nodes
in the upper tier and a large number of sensors in the lower tier could be promising for large …

On handling insider attacks in wireless sensor networks

C Krauß, M Schneider, C Eckert - Information Security Technical Report, 2008 - Elsevier
Wireless sensor networks can be used in various security-critical applications. The most
challenging security problems are insider attacks. In this article we present security …

Constrained function-based message authentication for sensor networks

CM Yu, YT Tsou, CS Lu, SY Kuo - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Sensor networks are vulnerable to false data injection attack and path-based denial of
service (PDoS) attack. While conventional authentication schemes are insufficient for solving …

[HTML][HTML] Acquiring authentic data in unattended wireless sensor networks

CM Yu, CY Chen, CS Lu, SY Kuo, HC Chao - Sensors, 2010 - mdpi.com
An Unattended Wireless Sensor Network (UWSN) can be used in many applications to
collect valuable data. Nevertheless, due to the unattended nature, the sensors could be …

[PDF][PDF] Data security in unattended wireless sensor networks through aggregate signcryption

FS Babamir, Z Eslami - … on Internet and Information Systems (TIIS), 2012 - koreascience.kr
In this paper, we propose aggregate signcryption for achieving data security in UWSNs. The
main challenge of these networks established in sensitive environments is offline sink …

A quality measure for multi-level community structure

M Delest, JM Fédou, G Melançon - 2006 Eighth International …, 2006 - ieeexplore.ieee.org
Mining relational data often boils down to computing clusters, that is finding sub-
communities of data elements forming cohesive sub-units, while being well separated from …

On the security of data collection and transmission from wireless sensor networks in the context of internet of things

H Yu, J He, R Liu, D Ji - International Journal of Distributed …, 2013 - journals.sagepub.com
In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor
networks (WSNs) can be used to monitor an event, jointly generate a report and then send it …

Information-theoretic modeling of false data filtering schemes in wireless sensor networks

Z Cao, H Deng, Z Guan, Z Chen - ACM Transactions on Sensor …, 2012 - dl.acm.org
False data filtering schemes are designed to filter out false data injected by malicious
sensors; they keep the network immune to bogus event reports. Theoretic understanding of …