close
1.

図書

図書
Peng Ning, Sihan Qing, Ninghui Li (eds.)
出版情報: Berlin : Springer, c2006  xiv, 558 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4307
所蔵情報: loading…
2.

電子ブック

EB
ACM Workshop on Security of Ad Hoc and Sensor Networks, Vijay Atluri, Wenliang Du, Peng Ning, Pierangela Samarati, Association for Computing Machinery-Digital Library., Association for Computing Machinery.
出版情報: ACM Digital Library Proceedings , ACM
所蔵情報: loading…
3.

電子ブック

EB
Peng Ning, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , ACM
所蔵情報: loading…
4.

電子ブック

EB
Peng Ning, Takeo Kanade, Ninghui Li, Sihan Qing
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
5.

電子ブック

EB
Michael Backes, Takeo Kanade, Peng Ning
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
6.

電子ブック

EB
Donggang Liu, Sushil Jajodia, Peng Ning
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Wireless Sensor Network / 1.1:
Design Challenges / 1.2:
Security Issues in Sensor Networks / 1.3:
Broadcast Authentication / 1.3.1:
Pairwise Key Establishment / 1.3.2:
Security in Localization / 1.3.3:
Orgnization of the Book / 1.4:
[mu]TESLA Broadcast Authentication / 2:
Multi-Level [mu]TESLA / 2.2:
Scheme I: Predetermined Key Chain Commitment / 2.2.1:
Scheme II: Naive Two-Level [mu]TESLA / 2.2.2:
Scheme III: Fault Tolerant Two-Level [mu]TESLA / 2.2.3:
Scheme IV: DOS-Tolerant Two-Level [mu]TESLA / 2.2.4:
Scheme V: DOS-Resistant Two-Level [mu]TESLA / 2.2.5:
Scheme VI: Multi-Level [mu]TESLA / 2.2.6:
Experimental Results / 2.2.7:
Tree-Based [mu]TESLA / 2.3:
The Basic Approach / 2.3.1:
A Scheme for Long-Lived Senders / 2.3.2:
Distributing Parameter Certificates / 2.3.3:
Revoking [mu]TESLA Instances / 2.3.4:
Implementation and Evaluation / 2.3.5:
Summary / 2.4:
Key Pre-Distribution Techniques in Sensor Networks / 3:
Polynomial-Based Key Pre-Distribution / 3.1.1:
Probabilistic Key Pre-Distribution / 3.1.2:
Polynomial Pool-Based Key Pre-Distribution / 3.2:
Phase 1: Setup / 3.2.1:
Phase 2: Direct Key Establishment / 3.2.2:
Phase 3: Path Key Establishment / 3.2.3:
Key Pre-Distribution Using Random Subset Assignment / 3.3:
The Random Subset Assignment Scheme / 3.3.1:
Performance / 3.3.2:
Overheads / 3.3.3:
Security Analysis / 3.3.4:
Comparison with Previous Schemes / 3.3.5:
Hypercube-based Key Pre-Distribution / 3.4:
The Hypercube-Based Scheme / 3.4.1:
Dynamic Key Path Discovery / 3.4.2:
Overhead / 3.4.3:
Optimization of Polynomial Evaluation / 3.4.5:
Evaluation / 3.5.2:
Improving Pairwise Key Establishment Using Deployment Knowledge / 3.6:
Improving Key Pre-Distribution with Prior Deployment Knowledge / 4.1:
A Location-Aware Deployment Model / 4.1.1:
Closest Pairwise Keys Scheme / 4.1.2:
Closest Polynomials Pre-Distribution Scheme / 4.1.3:
Improving Key Pre-Distribution with Post Deployment Knowledge / 4.2:
Key Prioritization Using Post Deployment Knowledge / 4.2.1:
Improving Random Subset Assignment Scheme with Deployment Locations / 4.2.2:
Improving Key Pre-Distribution with Group Deployment Knowledge / 4.3:
Group-Based Deployment Model / 4.3.1:
A General Framework / 4.3.2:
Performance Analysis / 4.3.3:
Secure Localization / 4.3.4:
Localization in Sensor Networks / 5.1:
Pitfalls of Current Localization Schemes under Attacks / 5.2:
Attack-Resistant Location Estimation / 5.3:
Assumptions / 5.3.1:
Attack-Resistant Minimum Mean Square Estimation (MMSE) / 5.3.2:
Voting-Based Location Estimation / 5.3.3:
Simulation Evaluation / 5.3.4:
Implementation and Field Experiments / 5.3.6:
A Detector for Malicious Beacon Nodes / 5.4:
Detecting Malicious Beacon Signals / 5.4.1:
Filtering Replayed Beacon Signals / 5.4.2:
Revoking Malicious Beacon Nodes / 5.4.3:
Summary and Future Work / 5.4.4:
Future Work / 6.1:
References
Index
Introduction / 1:
Wireless Sensor Network / 1.1:
Design Challenges / 1.2:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼