-
1
-
-
30344485824
-
-
TinyOS website, http://webs.cs.berkeley.edu/tos/.
-
-
-
-
2
-
-
33744923367
-
A survey on routing protocols for wireless sensor networks
-
To appear in
-
K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks, To appear in Journal of Ad Hoc Networks.
-
Journal of Ad Hoc Networks
-
-
Akkaya, K.1
Younis, M.2
-
3
-
-
17744386714
-
Key infection: Smart trust for smart dust
-
Berlin, Germany, October
-
R. Anderson, H. Chan, A. Perrig, Key infection: smart trust for smart dust, In 12th IEEE International Conference on Network Protocols, Berlin, Germany, October 2004.
-
(2004)
12th IEEE International Conference on Network Protocols
-
-
Anderson, R.1
Chan, H.2
Perrig, A.3
-
5
-
-
3943055289
-
An intrusion tolerant security server for an open distributed system
-
Toulouse, France
-
L. Blain, Y. Deswarte, An intrusion tolerant security server for an open distributed system, In First European Symposium in Computer Security, Toulouse, France, 1990.
-
(1990)
First European Symposium in Computer Security
-
-
Blain, L.1
Deswarte, Y.2
-
6
-
-
0036921939
-
Secure intrusion-tolerant replication on the internet
-
Washington DC, USA, June
-
C. Cachin, J.A. Poritz, Secure intrusion-tolerant replication on the internet, In IEEE International Conference on Dependable Systems and Networks (DSN'02), Washington DC, USA, June 2002.
-
(2002)
IEEE International Conference on Dependable Systems and Networks (DSN'02)
-
-
Cachin, C.1
Poritz, J.A.2
-
7
-
-
84944457899
-
Rapid prototyping of mobile input devices using wireless sensor nodes
-
Monterey, CA, USA, October
-
J. Carlson, R. Han, S. Lao, C. Narayan, S.S. ghani, Rapid prototyping of mobile input devices using wireless sensor nodes, In WMCSA'03, Monterey, CA, USA, October 2003.
-
(2003)
WMCSA'03
-
-
Carlson, J.1
Han, R.2
Lao, S.3
Narayan, C.4
Ghani, S.S.5
-
8
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
March
-
H. Chan, A. Perrig, PIKE: peer intermediaries for key establishment in sensor networks, In Proceedings of IEEE Infocom, March 2005.
-
(2005)
Proceedings of IEEE Infocom
-
-
Chan, H.1
Perrig, A.2
-
10
-
-
30344445246
-
Enhancing base station security in wireless sensor networks
-
Department of Computer Science, University of Colorado, April
-
J. Deng, R. Han, S. Mishra. Enhancing base station security in wireless sensor networks, Technical Report CU-CS-951-03, Department of Computer Science, University of Colorado, April 2003.
-
(2003)
Technical Report
, vol.CU-CS-951-03
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
11
-
-
4243199653
-
The performance evaluation of intrusion-tolerant routing in wireless sensor networks
-
Palo Alto, CA, USA, April
-
J. Deng, R. Han, S. Mishra, The performance evaluation of intrusion-tolerant routing in wireless sensor networks, In IEEE 2nd International Workshop on Information Processing in Sensor Networks (IPSN'03), Palo Alto, CA, USA, April 2003.
-
(2003)
IEEE 2nd International Workshop on Information Processing in Sensor Networks (IPSN'03)
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
12
-
-
4544340566
-
Security support for in-network processing in wireless sensor networks
-
First ACM Workshop on Security of Ad Hoc and Sensor Networks, in association with the Fairfax, VA, USA, October
-
J. Deng, R. Han, S. Mishra, Security support for in-network processing in wireless sensor networks, In First ACM Workshop on Security of Ad Hoc and Sensor Networks, in association with the 10th ACM Conference on Computer and Communications Security, Fairfax, VA, USA, October 2003.
-
(2003)
10th ACM Conference on Computer and Communications Security
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
13
-
-
4544298056
-
Inrusion tolerance and anti-traffic analysis strategies in wireless sensor networks
-
Florence, Italy, June
-
J. Deng, R. Han, S. Mishra, Inrusion tolerance and anti-traffic analysis strategies in wireless sensor networks, In IEEE International Conference on Dependable Systems and Networks (DSN' 04), Florence, Italy, June 2004.
-
(2004)
IEEE International Conference on Dependable Systems and Networks (DSN' 04)
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
14
-
-
84947273682
-
The sybil attack
-
First International Workshop on Peer-to-Peer Systems Cambridge, MA, USA, Springer, Berlin, March
-
J. Douceur, The sybil attack, In First International Workshop on Peer-to-Peer Systems, volume 2429 of Lecture Notes in Computer Science, Cambridge, MA, USA, Springer, Berlin, March 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2429
-
-
Douceur, J.1
-
15
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Hong Kong, China, March
-
W. Du, J. Deng, Y.S. Han, S. Chen, P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, In IEEE 23rd International Conference on Computer Communication, Hong Kong, China, March 2004.
-
(2004)
IEEE 23rd International Conference on Computer Communication
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
16
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington DC, USA, November
-
L. Eschenauer, V. Gligor, A key-management scheme for distributed sensor networks. In Conference on Computer and Communications Security, (CCS'02), Washington DC, USA, November 2002.
-
(2002)
Conference on Computer and Communications Security, (CCS'02)
-
-
Eschenauer, L.1
Gligor, V.2
-
17
-
-
0022564904
-
Intrusion-tolerance using fine-grain fragmentation-scattering
-
Oakland, CA, USA, April
-
J.-M. Fray, Y. Deswarte, D. Powell, Intrusion-tolerance using fine-grain fragmentation-scattering, In 1986 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 1986.
-
(1986)
1986 IEEE Symposium on Security and Privacy
-
-
Fray, J.-M.1
Deswarte, Y.2
Powell, D.3
-
18
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
San Diego, CA, USA, September
-
Y. Hu, A. Perrig, D. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, In Second ACM Workshop on Wireless Security (WiSe'03), San Diego, CA, USA, September 2003.
-
(2003)
Second ACM Workshop on Wireless Security (WiSe'03)
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
20
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Secure routing in wireless sensor networks: Attacks and countermeasures Ad Hoc Networks 1 2-3 2003
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
-
-
-
21
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington DC, USA, October
-
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, In CCS'03, Washington DC, USA, October 2003.
-
(2003)
CCS'03
-
-
Liu, D.1
Ning, P.2
-
22
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, J. Anderson, Wireless sensor networks for habitat monitoring, In First ACM Workshop on Wireless Sensor Networks and Applications (WSNA'02), pp. 88-97, 2002.
-
(2002)
First ACM Workshop on Wireless Sensor Networks and Applications (WSNA'02)
, pp. 88-97
-
-
Mainwaring, A.1
Polastre, J.2
Szewczyk, R.3
Culler, D.4
Anderson, J.5
-
23
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Santa Clara, CA, USA, October
-
D.J. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography, In First IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks(SECON'04), Santa Clara, CA, USA, October 2004.
-
(2004)
First IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks(SECON'04)
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
25
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
April
-
J. Newsome, R. Shi, D. Song, A. Perrig, The sybil attack in sensor networks: analysis and defenses, In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004), April 2004.
-
(2004)
Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004)
-
-
Newsome, J.1
Shi, R.2
Song, D.3
Perrig, A.4
-
26
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
Rome, Italy, July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. Tygar. Spins: security protocols for sensor networks, In Seventh Annual International Conference on Mobile Computing and Networking, Rome, Italy, July 2001, pp. 189-199.
-
(2001)
Seventh Annual International Conference on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
27
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar Spins: Security protocols for sensor networks Wireless Networks Journal (WINET) 8 5 2002 521 534
-
(2002)
Wireless Networks Journal (WINET)
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
28
-
-
0036930216
-
Quantifying the cost of providing intrusion tolerance in group communication systems
-
Washington DC, USA, June
-
H.V. Ramasamy, P. Pandey, J. Lyons, M. Cukier, W.H. Sanders, Quantifying the cost of providing intrusion tolerance in group communication systems, In DSN'02, Washington DC, USA, June 2002.
-
(2002)
DSN'02
-
-
Ramasamy, H.V.1
Pandey, P.2
Lyons, J.3
Cukier, M.4
Sanders, W.H.5
-
29
-
-
0036929535
-
Developing a heterogeneous intrusion tolerant corba system
-
Washington DC, USA, June
-
D. Sames, B. Matt, B. Niebuhr, G. Tally, B. Whitmore, D. Bakken, Developing a heterogeneous intrusion tolerant corba system. In DSN'02, Washington DC, USA, June 2002.
-
(2002)
DSN'02
-
-
Sames, D.1
Matt, B.2
Niebuhr, B.3
Tally, G.4
Whitmore, B.5
Bakken, D.6
-
31
-
-
0036793924
-
Denial of service in sensor networks
-
A. Wood Denial of service in sensor networks IEEE Computer 35 10 2002 54 62
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
-
32
-
-
85084160265
-
Building intrusion tolerant applications
-
Washington DC, USA, August
-
T.J. Wu, M. MalKin, D. Boneh, Building intrusion tolerant applications, In Eighth USENIX Security Symposium, Washington DC, USA, August 1999, pp. 79-91.
-
(1999)
Eighth USENIX Security Symposium
, pp. 79-91
-
-
Wu, T.J.1
Malkin, M.2
Boneh, D.3
-
33
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
Washington D.C, USA, October
-
S. Zhu, S. Setia, S. Jajodia. Leap: Efficient security mechanisms for large-scale distributed sensor networks. In 10th ACM Conference on Computer and Communications Security, Washington D.C, USA, October 2003.
-
(2003)
10th ACM Conference on Computer and Communications Security
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|