Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. B. Sheng, Q. Li, and W. Mao, “Data storage placement in sensor networks,” in ACM MobiHoc’06, Florence, Italy, May 2006, pp. 344–355.
    2. W. Zhang, H. Song, S. Zhu, and G. Cao, “Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks,” in ACM MobiHoc’05, Urbana-Champaign, IL, USA,May 2005, pp. 378–389.
    3. H. Wang and Q. Li, “Distributed user access control in sensor networks,” in DCOSS’06, San Francisco, CA, June 2006, pp. 305–320.
    4. D. Liu, “Efficient and distributed access control in sensor networks,” in DCOSS ’07, Santa Fe, New Mexico, USA, June 2007
    5. W.E. Cobb, E.D. Lapse, R.O. Baldwin, M.A. Temple, and Y.C. Kim, " Transfer of information on Information Forensics and Security” vol. 2, no. 4, pp. 14-24, Dec 2009
    6. K. Ren, W. Lou, and Y. Zhang, “Multi-user broadcast authentication in wireless sensor networks,” in IEEE SECON’07, San Diego, CA, June 2007, pp. 223–232.
    7. M. Shao, S. Zhu, W. Zhang, and G.Cao, “pDCS: Security and privacy support for data-centric sensor networks,” in IEEE INFOCOM’07, Anchorage, Alaska, USA, May 2007, pp. 1298–1306.
    8. Y. Zhou, Y. Zhang, and Y. Fang, “Access control in wireless sensor networks,” Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, vol. 5, no. 1, pp. 3–13, Jan. 2007. .
    9. NOPP, http://www.nopp.org/.
    10. IOOS, http://www.ocean.us/
    11. B. Carbunar, Y. Yu, L. Shi, M. Pearce, and V. Vasudevan, “Query privacy in wireless sensor networks,” in SECON ’07, San Diego, CA, USA, June 2007, pp. 203– 212.
    12. K. Ren, W. Lou, K. Kim, and R. Deng, “A novel privacy preserving authentication and access control scheme for pervasive computing environment,” in IEEE Transactions on Vehicular Technology, 2006.
    13. S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient security mechanisms for large-scale distributed sensor networks,” in ACM CCS’03, Washington, DC, Oct. 2003, pp. 62–72.
    14. H. Chan, A. Perrig, and D. Song, “Random key pre distribution schemes for sensor networks,” in S&P’03, Oakland, CA, May 2003, pp. 197–213.
    15. D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in ACM CCS’03, Washington, DC, Oct. 2003, pp. 52–61.
    16. Y. Zhang,W.Liu, W.Lou, and Y. Compromisetolerant Fang,“Location-based security mechanisms for wireless sensor networks,” IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, vol.24,no.2,pp.247-260 feb 2006

Recent Article