-
1
-
-
0036688074
-
A survey on sensor networks
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Commun. Mag. 40 (8) (2002) 102-114.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
10644296110
-
Communications security architecture for army sensor networks
-
30 September
-
D. Balenson et al., Communications security architecture for army sensor networks, NAI Labs T.R. #00-016, 30 September 2000.
-
(2000)
NAI Labs T.R. #00-016
, vol.16
-
-
Balenson, D.1
-
3
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
1 June
-
D. Carman, P. Kruus, B. Matt, Constraints and approaches for distributed sensor network security, NAI Labs T.R. #00-010, 1 June 2000.
-
(2000)
NAI Labs T.R. #00-010
, vol.10
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
4
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, July
-
A. Perrig, R. Szewczyk, V. Wen, D. culler, J. Tygar, SPINS: security protocols for sensor networks, in: Seventh Annual ACM International Conference on Mobile Computing and Networks (Mobicom 2001), Rome, Italy, July 2001.
-
(2001)
Seventh Annual ACM International Conference on Mobile Computing and Networks (Mobicom 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
5
-
-
0035789267
-
Secure pebblenets
-
ACM Press, New York
-
S. Basagni, K. Herrin, D. Bruschi, E. Rosti, Secure pebblenets, in: Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM Press, New York, 2001, pp. 156-163.
-
(2001)
Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
7
-
-
0034317075
-
Key agreement in ad hoc networks
-
N. Asokan, P. Ginzboorg, Key agreement in ad hoc networks, Comp. Commun. 23 (2000) 1627-1637.
-
(2000)
Comp. Commun.
, vol.23
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
8
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou, Z.J. Haas, Securing ad hoc networks, IEEE Network 13 (6) (1999) 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
9
-
-
1842643245
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, Providing robust and ubiquitous security support for mobile ad-hoc networks, IEEE ICNP, 2001.
-
(2001)
IEEE ICNP
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
10
-
-
0003902871
-
-
Addison-Wesley, Reading, MA
-
C. Perkins, Ad Hoc Networks, Addison-Wesley, Reading, MA, 2000.
-
(2000)
Ad Hoc Networks
-
-
Perkins, C.1
-
11
-
-
0036793924
-
Denial of service in sensor networks
-
A.D. Wood, J.A. Stankovic, Denial of service in sensor networks, IEEE Comp. 35 (10) (2002) 54-62.
-
(2002)
IEEE Comp.
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
12
-
-
10644292226
-
BluetoothTM security white paper
-
Bluetooth SIG Security Expert Group, April
-
C. Gehrmann, BluetoothTM Security White Paper, White paper, Bluetooth SIG Security Expert Group, April 2002.
-
(2002)
White Paper
-
-
Gehrmann, C.1
-
13
-
-
1542267055
-
Assessing security-critical energy-efficient sensor networks
-
Department of Computer Science, University of Twente, July
-
Y.W. Law, S. Dulman, S. Etalle, P. Havinga, Assessing security-critical energy-efficient sensor networks, Department of Computer Science, University of Twente, Technical Report TR-CTIT-02-18, July 2002.
-
(2002)
Technical Report
, vol.TR-CTIT-02-18
-
-
Law, Y.W.1
Dulman, S.2
Etalle, S.3
Havinga, P.4
-
15
-
-
10644287069
-
-
Networking Laboratory, Helsinki University of Technology
-
Z. Yan, Security in ad hoc networks, Networking Laboratory, Helsinki University of Technology. Available from 〈http://citeseer.nj.nec.com/536945.html〉.
-
Security in Ad Hoc Networks
-
-
Yan, Z.1
-
16
-
-
10644269064
-
Prevention of denial of service attacks and selfishness in mobile ad hoc networks
-
January
-
P. Michiardi, R. Molva, Prevention of denial of service attacks and selfishness in mobile ad hoc networks, Research Report No RR-02-063, January 2002.
-
(2002)
Research Report No RR-02-063
, vol.RR-02-063
-
-
Michiardi, P.1
Molva, R.2
-
17
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
Springer, New York
-
T. Aura, P. Nikander, J. Leiwo, DOS-resistant authentication with client puzzles, in: Proceedings of Security Protocols Workshop 2000, Springer, New York, 2000, pp. 170-177.
-
(2000)
Proceedings of Security Protocols Workshop 2000
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
18
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of MOBICOM, 2000.
-
(2000)
Proceedings of MOBICOM
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
19
-
-
10644289075
-
Core: A Collaborative Reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi, R. Molva, Core: A Collaborative Reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Communications and Multimedia Security Conference, 2002.
-
(2002)
Communications and Multimedia Security Conference
-
-
Michiardi, P.1
Molva, R.2
-
20
-
-
10644269064
-
Prevention of denial of service attacks and selfishness in mobile ad hoc networks
-
Institut Eurécom, France
-
P. Michiardi, R. Molva, Prevention of denial of service attacks and selfishness in mobile ad hoc networks, Research Report RR-02-063, Institut Eurécom, France, 2002.
-
(2002)
Research Report
, vol.RR-02-063
-
-
Michiardi, P.1
Molva, R.2
-
21
-
-
3042542420
-
Simulation-based analysis of security exposures in mobile ad hoc networks
-
Florence, Italy, 25-28 February
-
P. Michiardi, R. Molva, Simulation-based analysis of security exposures in mobile ad hoc networks, in: European Wireless 2002: Next Generation Wireless Networks: Technologies, Protocols, Services and Applications, Florence, Italy, 25-28 February 2002.
-
(2002)
European Wireless 2002: Next Generation Wireless Networks: Technologies, Protocols, Services and Applications
-
-
Michiardi, P.1
Molva, R.2
-
22
-
-
0035365149
-
Self-organization in mobile ad hoc networks: The approach of terminodes
-
L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J.-P. Hubaux, J.-Y. Le Boudec, Self-organization in mobile ad hoc networks: the approach of terminodes, IEEE Commun. Mag. 39 (6) (2001) 164-174.
-
(2001)
IEEE Commun. Mag.
, vol.39
, Issue.6
, pp. 164-174
-
-
Blazevic, L.1
Buttyan, L.2
Capkun, S.3
Giordano, S.4
Hubaux, J.-P.5
Le Boudec, J.-Y.6
-
23
-
-
0004118144
-
Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
-
Department of Communication Systems, Swiss Federal Institute of Technology
-
L. Buttyáan, J.-P. Hubaux, Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology, 2001.
-
(2001)
Technical Report
, vol.DSC-2001-001
-
-
Buttyáan, L.1
Hubaux, J.-P.2
-
24
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Canary Islands, Spain, January
-
S. Buchegger, J.-Y. Le Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, in: Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Net-work-based Processing, Canary Islands, Spain, January 2002.
-
(2002)
Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Net-work-based Processing
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
25
-
-
0035789243
-
Security-aware ad hoc routing for wireless networks
-
ACM Press, New York
-
S. Yi, P. Naldurg, R. Kravets, Security-aware ad hoc routing for wireless networks, in: Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM Press, New York, 2001, pp. 299-302.
-
(2001)
Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 299-302
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
26
-
-
0035009294
-
Distributed topology control for power efficient operation in multihop wireless ad hoc networks
-
R. Wattenhofer, L. Li, P. Bahl, Y.M. Wang, Distributed topology control for power efficient operation in multihop wireless ad hoc networks, in: Proceedings of IEEE Infocom, 2001.
-
(2001)
Proceedings of IEEE Infocom
-
-
Wattenhofer, R.1
Li, L.2
Bahl, P.3
Wang, Y.M.4
-
27
-
-
0032667849
-
Determining the optimal configuration for the zone routing protocol
-
Special issue on Wireless Ad Hoc Networks
-
M. Pearlman, Z. Haas, Determining the optimal configuration for the zone routing protocol, IEEE J. Select. Area. Commun., Special issue on Wireless Ad Hoc Networks 17 (8) (1999) 1395-1414.
-
(1999)
IEEE J. Select. Area. Commun.
, vol.17
, Issue.8
, pp. 1395-1414
-
-
Pearlman, M.1
Haas, Z.2
-
29
-
-
0021198082
-
The design and simulation of a mobile radio network with distributed control
-
D.J. Baker, A. Ephremides, J.A. Flynn, The design and simulation of a mobile radio network with distributed control, IEEE J. Select. Area. Commun. SAC-2 (1) (1984) 226-237.
-
(1984)
IEEE J. Select. Area. Commun.
, vol.SAC-2
, Issue.1
, pp. 226-237
-
-
Baker, D.J.1
Ephremides, A.2
Flynn, J.A.3
-
30
-
-
0024701852
-
A trade-off between space and efficiency for routing tables
-
July
-
D. Peleg, E. Upfal, A trade-off between space and efficiency for routing tables, J. ACM 36 (3) (1989) 510-530, July.
-
(1989)
J. ACM
, vol.36
, Issue.3
, pp. 510-530
-
-
Peleg, D.1
Upfal, E.2
-
31
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
32
-
-
0008144151
-
Ubiquitous and robust authentication services for ad hoc wireless networks
-
UCLA Computer Science Department
-
H. Luo, S. Lu, Ubiquitous and robust authentication services for ad hoc wireless networks, Technical Report 200030, UCLA Computer Science Department, 2000.
-
(2000)
Technical Report 200030
-
-
Luo, H.1
Lu, S.2
-
33
-
-
10644296109
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, Self-securing ad hoc wireless networks, IEEE ISCC, 2002.
-
(2002)
IEEE ISCC
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
35
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Long Beach, CA, USA, October
-
J.P. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, USA, October 2001.
-
(2001)
Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Hubaux, J.P.1
Buttyan, L.2
Capkun, S.3
-
36
-
-
10644278482
-
EYES project
-
University of Twente, The Netherlands
-
EYES project, Security in wireless sensor networks, University of Twente, The Netherlands. Available from 〈http://wwwes.cs.utwente.nl/24cqet/adhoc.html〉.
-
Security in Wireless Sensor Networks
-
-
-
37
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA, November
-
L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, CCS'02, Washington, DC, USA, November 2002.
-
(2002)
CCS'02
-
-
Eschenauer, L.1
Gligor, V.D.2
-
38
-
-
4043173834
-
A taxonomy for routing protocols in mobile ad hoc networks
-
Swedish Institute of Computer Science, October
-
L. Feeney, A taxonomy for routing protocols in mobile ad hoc networks, Technical Report T99/07, Swedish Institute of Computer Science, October 1999.
-
(1999)
Technical Report
, vol.T99-07
-
-
Feeney, L.1
-
39
-
-
10644253282
-
Ad hoc ondemand distance vector routing
-
University of California, Santa Barbara, Ad Hoc OnDemand Distance Vector Routing. Home page. Available from 〈http://moment.cs.ucsb.edu/AODV/aodv.html〉.
-
Home Page
-
-
-
40
-
-
10644254146
-
Monarch project: Mobile networking architectures
-
Rice University, Rice University Monarch Project: Mobile Networking Architectures. Home page. Available from 〈http://www.monarch.cs.rice.edu〉.
-
Home Page
-
-
-
44
-
-
0027693935
-
Diversity coding for selfhealing and fault tolerant communication networks
-
E. Ayanoglu, I. Chih-Lin, R. Gitlin, J. Mazo, Diversity coding for selfhealing and fault tolerant communication networks, IEEE Trans. Commun. 41 (11) (1993) 1677-1688.
-
(1993)
IEEE Trans. Commun.
, vol.41
, Issue.11
, pp. 1677-1688
-
-
Ayanoglu, E.1
Chih-Lin, I.2
Gitlin, R.3
Mazo, J.4
-
45
-
-
0035365149
-
Self-organization in mobile ad hoc networks: The approach of terminodes
-
L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J.-P. Hubaux, J.-Y. Le Boudec, Self-organization in mobile ad hoc networks: the approach of terminodes, IEEE Commun. Mag. 39 (6) (2001) 164-174.
-
(2001)
IEEE Commun. Mag.
, vol.39
, Issue.6
, pp. 164-174
-
-
Blazevic, L.1
Buttyan, L.2
Capkun, S.3
Giordano, S.4
Hubaux, J.-P.5
Le Boudec, J.-Y.6
-
46
-
-
0004118152
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Department of Computer Science, Rice University
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, Technical Report TR01-383, Department of Computer Science, Rice University, 2001.
-
(2001)
Technical Report
, vol.TR01-383
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
47
-
-
10644232749
-
A preliminary study of identity-based, group key establishment protocols for resource constrained battlefield networks
-
Network Associates Laboratories, September
-
B. Matt, A preliminary study of identity-based, group key establishment protocols for resource constrained battlefield networks, Technical Report 02-034, Network Associates Laboratories, September 2002.
-
(2002)
Technical Report
, vol.2
, Issue.34
-
-
Matt, B.1
-
48
-
-
27544440245
-
-
TR CU-CS-939-02, Dept of Computer Science, University of Colorado
-
J. Deng, R. Han, S. Mishra, INSENS: Intrution-tolerant routing in wireless sensor networks, TR CU-CS-939-02, Dept of Computer Science, University of Colorado.
-
INSENS: Intrution-tolerant Routing in Wireless Sensor Networks
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
49
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
Paris, France, November 2002, in press
-
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, A secure routing protocol for ad hoc networks, in: International Conference on Network Protocols (ICNP), Paris, France, November 2002, in press.
-
International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
52
-
-
0035009259
-
A clustering scheme for hierarchical control in multi-hop wireless networks
-
S. Banerjee, S. Khuller, A clustering scheme for hierarchical control in multi-hop wireless networks, IEEE Infocom 2001.
-
(2001)
IEEE Infocom
-
-
Banerjee, S.1
Khuller, S.2
-
53
-
-
0033877788
-
Energy-efficient communication protocol for wireless microsensor networks
-
January
-
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in: IEEE Proceedings of the Hawaii International Conference on System Sciences, January 2000, pp. 1-10.
-
(2000)
IEEE Proceedings of the Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
-
54
-
-
85035363269
-
Adaptive protocols for information dissemination in wireless sensor networks
-
Seattle, WA
-
W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive protocols for information dissemination in wireless sensor networks, in: Proceedings of the ACM MobiCom'99, Seattle, WA, 1999, pp. 174-185.
-
(1999)
Proceedings of the ACM MobiCom'99
, pp. 174-185
-
-
Heinzelman, W.R.1
Kulik, J.2
Balakrishnan, H.3
-
55
-
-
0034291065
-
Protocols for self-organization of a wireless sensor network
-
K. Sohrabi, J. Gao, V. Ailawadhi, G.J. Pottie, Protocols for self-organization of a wireless sensor network, IEEE Person. Commun. 7 (5) (2000) 16-27.
-
(2000)
IEEE Person. Commun.
, vol.7
, Issue.5
, pp. 16-27
-
-
Sohrabi, K.1
Gao, J.2
Ailawadhi, V.3
Pottie, G.J.4
-
56
-
-
0003048077
-
The S/KEY one-time password system
-
N.M. Haller, The S/KEY one-time password system, in: ISOC, 1994.
-
(1994)
ISOC
-
-
Haller, N.M.1
-
57
-
-
4544290017
-
Secure selective exclusion in ad-hoc wireless network
-
M.A. Ghonaimy, T. Mahmoud, E.-H. Heba, K. Asian (Eds.), Kluwer Academic Publishers, Boston
-
R. Pietro, L.V. Mancini, S. Jajodia, Secure selective exclusion in ad-hoc wireless network, in: M.A. Ghonaimy, T. Mahmoud, E.-H. Heba, K. Asian (Eds.), Security in Infomation Society: Visions and Perspectives, Kluwer Academic Publishers, Boston, 2002, pp. 423-434.
-
(2002)
Security in Infomation Society: Visions and Perspectives
, pp. 423-434
-
-
Pietro, R.1
Mancini, L.V.2
Jajodia, S.3
-
59
-
-
10644231488
-
-
NAI Lab. Available from 〈http://www.nai.com/nai_labs/-asp_set/crypto/crypt_senseit.asp〉.
-
-
-
-
60
-
-
0036986441
-
An on-demand secure routing protocol resilent to byzantine failures
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, H. Rubens, An on-demand secure routing protocol resilent to byzantine failures, in: ACM Workshop on Wireless Security (WISE), 2002, pp. 21-30.
-
(2002)
ACM Workshop on Wireless Security (WISE)
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
63
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 21 (2) (1978) 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
66
-
-
0013044260
-
Highly resilient, energy efficient multipath routing in wireless sensor networks
-
D. Ganesan, R. Govindan, S. Shenker, D. Estrin, Highly resilient, energy efficient multipath routing in wireless sensor networks, Mobile Comput. Commun. Rev. (MC2R) 1 (2) (2002).
-
(2002)
Mobile Comput. Commun. Rev. (MC2R)
, vol.1
, Issue.2
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
67
-
-
3042667172
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Department of Computer Science, Rice University, June
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, Technical Report TR01-384, Department of Computer Science, Rice University, June 2002.
-
(2002)
Technical Report
, vol.TR01-384
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
|