Способи забезпечення інформаційної безпеки сенсорних мереж

Надіслав: o.tsoorin , дата: пт, 07/03/2020 - 09:02
ПІБ наукового керівника з списку
ЯВІСЯ ВАЛЕРІЙ СЕРГІЙОВИЧ
ПІБ студента
Суліковський Олексій Сергійович
Дата публікації
2020рік
Бібліографічний опис
1. Papadimitratos, P. “Secure Routing for Mobile Ad hoc Networks.” / Z.J. Haas. //Proceedings of the SCS Communication Networks and Distributed System Modeling and Simulation Conference (CNDS 2002) -January 2002. -P27-31, San Antonio, TX, USA.
2. Tanachaiwiwat “Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks.” /S., P. Dave /R. Bhindwale/ A. Helmy. November 2003. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (ACM SenSys’03), 324-325, Los Angeles, USA
3. Estrin, D., R. Govindan, J. S. Heidemann, and S. Kumar. 1999. “Next Century Challenges: Scalable Coordination in Sensor Networks.” In Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom’99), 263-270, Seattle, Washington, USA, August 1999.
4. Hu, L., and D. Evans. 2003. “Secure Aggregation for Wireless Networks.” In Proceedings of theInternational Symposium on Applications and the Internet (SAINT’03) Workshops, 384, Orlando, Florida, USA, January 2003, IEEE Computer Society
5. Carman, D. W., P. S. Krus, and B. J. Matt. 2000. “Constraints and Approaches for Distributed Sensor Network Security.” Technical Report 00-010, NAI Labs, Network Associates Inc., Glenwood, MD, USA.
6. Eschenauer L., and V. D. Gligor. November 2002. “A Key-Management Scheme for Distributed Sensor Networks.” In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS’02), 41-47, Washington DC, USA.
7. Chan, H., A. Perrig, and D. Song. May 2003. Random Key Pre-Distribution Schemes for Sensor Networks.” In Proceedings of the IEEE Symposium on Security and Privacy (S&P’03), 197, Berkeley, California, USA.
8. Hill, J., R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. Pister. 2000. “System Architecture Directions for Networked Sensors.” In Proceedings of the 9th International Conference on Architectural
9. Law, Y. W., J. M. Doumen, and P. H. Hartel. October 2004. “Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract).” In Proceedings of the 1st IEEE International Conference of Mobile Ad-hoc and Sensor Systems, 447- 456,IEEE Computer Society Press
10. Ganesan, P., R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu. 2003. “Analyzing and Modeling Encryption Overhead for Sensor Network Nodes.” In Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, 151-159, New York: ACM Press.
11. Lai, B., S. Kim, and I. Verbauwhede. 2002. “Scalable Session Key Construction Protocols for Wireless Sensor Networks.” In Proceedings of the IEEE Workshop on Large Scale Real Time and Embedded Systems (LATES’02), 1-6, Austin, Texas, USA.
12. Komerling O., and M. G. Kuhn. 1999. “Design Principles for Tamper-Resistant Smart Card Processors.” In Proceedings of USENIX Workshop on Smartcard Technology, 9-20, Chicago, Illinois, USA
13. https://courses.csail.mit.edu/6.857/2017/project/17.pdf
вид документа
бакалаврська робота
Ключові слова
Бездротові сенсорні мережі, WSN, інформаційна безпека, алгоритми шифрування, ZigBee, LoRaWan, SNEP, Rijndael