A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications
出版年份 2018 全文链接
标题
A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications
作者
关键词
-
出版物
SENSORS
Volume 18, Issue 12, Pages 4346
出版商
MDPI AG
发表日期
2018-12-10
DOI
10.3390/s18124346
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
- (2018) Khizar Hameed et al. Future Generation Computer Systems-The International Journal of eScience
- IoT security: Review, blockchain solutions, and open challenges
- (2018) Minhaj Ahmad Khan et al. Future Generation Computer Systems-The International Journal of eScience
- The application of internet of things in healthcare: a systematic literature review and classification
- (2018) Hossein Ahmadi et al. Universal Access in the Information Society
- Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks
- (2017) Jie Cui et al. Peer-to-Peer Networking and Applications
- Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints
- (2016) Anas Bushnag et al. SENSORS
- Detecting Malicious Data Injections in Wireless Sensor Networks
- (2015) Vittorio P. Illiano et al. ACM COMPUTING SURVEYS
- A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs
- (2015) Djallel Eddine Boubiche et al. IEEE COMMUNICATIONS LETTERS
- A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems
- (2015) Xinyu Yang et al. IEEE TRANSACTIONS ON COMPUTERS
- IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks
- (2015) Tzonelih Hwang et al. WIRELESS PERSONAL COMMUNICATIONS
- Secure data aggregation in wireless sensor networks using homomorphic encryption
- (2014) Manish Kumar et al. INTERNATIONAL JOURNAL OF ELECTRONICS
- Internet of Things (IoT): A vision, architectural elements, and future directions
- (2013) Jayavardhana Gubbi et al. Future Generation Computer Systems-The International Journal of eScience
- A reversible watermarking authentication scheme for wireless sensor networks
- (2013) Xi Shi et al. INFORMATION SCIENCES
- On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas
- (2013) Hong-Ning Dai et al. International Journal of Distributed Sensor Networks
- Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks
- (2012) Bo Sun et al. IEEE Systems Journal
- Efficient and provably secure aggregation of encrypted data in wireless sensor networks
- (2009) Claude Castelluccia et al. ACM Transactions on Sensor Networks
- Confidentiality and integrity for data aggregation in WSN using peer monitoring
- (2009) Roberto Di Pietro et al. Security and Communication Networks
- LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
- (2008) Kui Ren et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreDiscover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversation