共 37 条
[1]
On the difficulty of software-based attestation of embedded devices. C.Castelluccia,A.Francillon,D.Perito,C.Soriente. Proc of the 16th ACM Conference on Computer and Communications Security . 2009
[2]
Practical analysis framework for software-based attestation scheme. L.Li,H.Hu,J.Sun,Y.Liu,J.S.Dong. Formal Methods and Software Engineering . 2014
[3]
Lightweight attestation scheme for wireless sensor network. S.Kiyomoto,Y.Miyake. International Journal of Security&Its Applications . 2014
[4]
Leveraging remote attestation to enhance the unified trust model for WSNs. H.Khiabani,N.B.Idris,J.L.Ab Manan. Proc IEEE International Conference on Cyber Security,Cyber Warfare and Digital Forensic . 2012
[6]
A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks[J] . Yusnani Mohd Yussoff,Habibah Hashim,Roszainiza Rosli,Mohd Dani Baba.  Procedia Engineering . 2012
[7]
Towards self-propagate mal-packets in sensor networks. Q.Gu,R.Noorani. Proc of the First ACM Conference on Wireless Network Security . 2008
[8]
T-CUP:A TPM-based code update protocol enabling attestations for sensor networks. S.Wagner,C.Krau,C.Eckert. Security and Privacy in Communication Networks . 2012
[9]
A TPM-enabled remote attestation protocol (TRAP)in wireless sensor networks. H.Tan,W.Hu,S.Jha. Proc of the 6th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks . 2011
[10]
SCUBA:Secure code update by attestation in sensor networks. Seshadri A,Luk M,Perrig A,van Doorn L,Khosla P. ACM Workshop on Wireless Security (WiSe 2006) . 2006