[1]
|
C. Krau?, F. Stumpf and C. Eckert, “Detecting Node Compro-mise in Hybrid Wireless Sensor Networks Using Attestation Techniques,” Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, 2007.
|
[2]
|
T. G. Handel and M. T. Sandford, “Hiding Data in the OSI Network Model,” Proceedings of the First International Workshop on Information Hiding, Vol. 1174, 1996, pp. 23-38. doi: 10.1007/3-540-61996-8_29
|
[3]
|
B. W. Lampson, “A Note on the Confinement Problem,” Communications of the ACM, Vol. 16, No. 10, 1973. doi:10.1145/362375.362389
|
[4]
|
G. J. Simmons, “The Prisoner’s Problem and the Subliminal Channel,” Workshop on Communications Security (CRYPTO’83), 1984.
|
[5]
|
F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding - A Survey,” Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 1999.
|
[6]
|
National Computer Security Center, “A Guide to Understanding Covert Channel Analysis of Trusted Systems,” 1993.
|
[7]
|
Crossbow Technology Inc., “MPR-MIB Users Manual,” June 2006.
|
[8]
|
Crossbow Technology Inc., “MTS/MDA Sensor Board Users Manual,” June 2006.
|