[ 1 ] Pietro D R,Mancini L V,Soriente C,et al. Catch Me (If
You Can ): Data Survival in Unattended Sensor
Networks [ C ] / / Proceedings of the 6th Annual IEEE
International Conference on PerCom. Washington D. C., USA:IEEE Press,2001:185-194.
[ 2 ] Ma D,Soriente C,Tsudik G. New Adversary and New
Threats:Security in Unattended Sensor Networks [J].
IEEE Network,2009,23(2):43-48.
[ 3 ] Vitali D,Spognardi A,Mancini LV. Replication Schemes in
Unattended Wireless Sensor Networks[C]/ / Proceedings of
the 4th IFIP International Conference on New
Technologies,Mobility and Security. Washington D. C., USA:IEEE Press,2011:1-5.
[ 4 ] Vitali D,Spognardi A,Villani A,et al. MhRep:Multihop
Replication Scheme for Data Survival in Unattended
Wireless Sensor Networks[C] / / Proceedings of the 30th
IEEE Symposium on Reliable Distributed Systems
Workshops. Washington D. C.,USA:IEEE Press,2011:
42-51.
[ 5 ] Thi M Y V, Talim J. Random Distribution for Data
Survival in Unattended Wireless Sensor Networks [C]/ /
Proceedings of the 4th International Conference on Sensor
Technologies and Applications. Washington D. C.,USA: IEEE Press,2010:468-471.
[ 6 ] 韩明军,熊 焰,刘 涛,等. 无人值守WSN 中数据概
率复制生存仿真与研究[J]. 计算机仿真,2013,(7):
251-255.
(下转第155 页)
(上接第150 页)
[ 7 ] Ren Wei,Zhao Junge,Ren Yi. MSS:A Multi-level Data
Placement Scheme for Data Survival in Wireless Sensor
Networks [ C ]/ / Proceedings of the 5th International
Conference on Wireless Communications,Networking and
Mobile Computing. Washington D. C.,USA:IEEE Press,
2009:1-4.
[ 8 ] Wang Qian,Ren Kui,Lou Wenjing,et al. Dependable
and Secure Sensor Data Storage with Dynamic Integrity
Assurance[C] / / Proceedings of IEEE INFOCOM’09.
Washington D. C.,USA:IEEE Press,2009:954-962.
[ 9 ] Shamir A. How to Share a Secret[J]. Communications
of the ACM,1979,22 (11):612-613.
[10] 韩明军,熊 焰,陆琦玮,等. 无人值守WSN 中基于中
国剩余定理的可靠数据生存方案[J]. 计算机应用,
2013,35(5):1343-1346.
[11] Blundo C,De Santis A, Herzberg A, et al. Perfectlysecure
Key Distribution for Dynamic Conferences[C] / /
Proceedings of Advances in Cryptology-CRYPTO’93.
Berlin,Germany:Springer,1993:471-486.
[12] Krawczyk H,Canetti R,Bellare M. HMAC:Keyed-hashing
for Message Authentication[S]. RFC 2104,1997.
[13] Rabin M O. Efficient Dispersal of Information for
Security, Load Balancing, and Fault Tolerance [ J ].
Journal of the ACM,1989,36(2):335-348.
[14] Reed I S, Solomon G. Polynomial Codes over Certain
Finite Fields[J]. Journal of the Society for Industrial &
Applied Mathematics,1960,8(2):300-304.
[15] Asmuth C, Bloom J. A Modular Approach to Key
Safeguarding [ J ]. IEEE Transactions on Information
Theory,1983,29(2):208-210.
[16] Harn L,Lin C. Detection and Identification of Vheaters
in (t,n) Secret Sharing Scheme[J]. Designs,Codes and
Cryptography,2009,52(1):15-24.
[17] Lu Q,Xiong Y,Huang W,et al. A Distributed ECC-DSS
Authentication Scheme Based on CRT-VSS and Trusted
Computing in MANET[C]/ / Proceedings of the 11th IEEE
International Conference on Trust,Security and Privacy in
Computing and Communications. Washington D. C.,USA: IEEE Press,2012:656-665.
编辑 索书志 |