-
1
-
-
0037086890
-
"Wireless Sensor Networks: A Survey"
-
Mar
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, vol. 38, no. 4, pp. 393-422, Mar. 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
0012979825
-
"A Taxonomy of Wireless Microsensor Network Models"
-
S. Tilak, N.B. Abu-Ghazaleh, and W. Heinzelman, "A Taxonomy of Wireless Microsensor Network Models," ACM Mobile Computing and Comm. Rev., vol. 6, no. 2, pp. 1-8, 2002.
-
(2002)
ACM Mobile Computing and Comm. Rev.
, vol.6
, Issue.2
, pp. 1-8
-
-
Tilak, S.1
Abu-Ghazaleh, N.B.2
Heinzelman, W.3
-
3
-
-
1842815887
-
"Security in Mobile Ad-Hoc Wireless Networks: Challenges and Solutions"
-
Feb
-
H. Yang et al., "Security in Mobile Ad-Hoc Wireless Networks: Challenges and Solutions," IEEE Wireless Comm. Magazine, vol. 11, no. 1, pp. 38-47, Feb. 2004.
-
(2004)
IEEE Wireless Comm. Magazine
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
-
4
-
-
0033357103
-
"Securing Ad Hoc Networks"
-
Nov./Dec
-
L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Networks, vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
-
(1999)
IEEE Networks
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
5
-
-
0010461175
-
"Constraints and Approaches for Distributed Sensor Networks Security"
-
Technical Report 00-010, NAI Labs, Sept
-
D. Carman, P. Kruus, and B. Matt, "Constraints and Approaches for Distributed Sensor Networks Security," Technical Report 00-010, NAI Labs, Sept. 2000.
-
(2000)
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
6
-
-
84883897746
-
"A Low-Energy Key Management Protocol for Wireless Sensor Networks"
-
June
-
G. Jolly, M. Kuscu, P. Kokate, and M. Younis, "A Low-Energy Key Management Protocol for Wireless Sensor Networks," Proc. Eighth IEEE Symp. Computers and Comm. (ISCC '03), June 2003.
-
(2003)
Proc. Eighth IEEE Symp. Computers and Comm. (ISCC '03)
-
-
Jolly, G.1
Kuscu, M.2
Kokate, P.3
Younis, M.4
-
7
-
-
33746045935
-
-
TinySec
-
TinySec, http://www.cs.berkeley.edu/nks/tinysec/, 2006.
-
(2006)
-
-
-
11
-
-
10944266504
-
"HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks"
-
Oct.-Dec
-
O. Younis and S. Fahmy, "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks," IEEE Trans. Mobile Computing, vol. 3, no. 4, pp. 366-379, Oct.-Dec. 2004.
-
(2004)
IEEE Trans. Mobile Computing
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
12
-
-
0141509888
-
"Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison"
-
Nov
-
K. Langendoen and N. Reijers, "Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison," Computer Networks, vol. 43, no. 4, pp. 499-518, Nov. 2003.
-
(2003)
Computer Networks
, vol.43
, Issue.4
, pp. 499-518
-
-
Langendoen, K.1
Reijers, N.2
-
14
-
-
2442607915
-
"Mica: The Commercialization of Microsensor Motes"
-
Apr
-
M. Horton et al., "Mica: The Commercialization of Microsensor Motes," Sensors Online Magazine, http://www.sensorsmag.com/articles/0402/40/main.shtml, Apr. 2002.
-
(2002)
Sensors Online Magazine
-
-
Horton, M.1
-
15
-
-
3543105535
-
"Combinatorial Optimization of Key Management in Group Communications"
-
Mar
-
M. Eltoweissy, H. Heydari, L. Morales, and H. Sadborough, "Combinatorial Optimization of Key Management in Group Communications," J. Network and Systems Management, vol. 12, no. 1, pp. 33-50, Mar. 2004.
-
(2004)
J. Network and Systems Management
, vol.12
, Issue.1
, pp. 33-50
-
-
Eltoweissy, M.1
Heydari, H.2
Morales, L.3
Sadborough, H.4
-
18
-
-
1442357062
-
"US Secure Hash Algorithm 1 (SHA-1)"
-
RFC 3174, IETF, Sept
-
D. Eastlake and P. Jones, "US Secure Hash Algorithm 1 (SHA-1)," RFC 3174, IETF, Sept. 2001.
-
(2001)
-
-
Eastlake, D.1
Jones, P.2
-
19
-
-
0003602325
-
"The MD5 Message-Digest Algorithm"
-
RFC 1320, MIT and RSA Data Security, Inc., Apr
-
R. Rivest, "The MD5 Message-Digest Algorithm," RFC 1320, MIT and RSA Data Security, Inc., Apr. 1992.
-
(1992)
-
-
Rivest, R.1
-
20
-
-
33746065961
-
"Coloring Heuristics for Register Allocation"
-
June
-
P. Briggs, K. Cooper, K. Kennedy, and L. Torczon, "Coloring Heuristics for Register Allocation," Proc. ASCM Conf. Program Language Design and Implementation, June 1989.
-
(1989)
Proc. ASCM Conf. Program Language Design and Implementation
-
-
Briggs, P.1
Cooper, K.2
Kennedy, K.3
Torczon, L.4
-
21
-
-
0003677229
-
-
second ed. Springer-Verlag, Feb
-
R. Diestel, Graph Theory, second ed. Springer-Verlag, Feb. 2000.
-
(2000)
Graph Theory
-
-
Diestel, R.1
-
22
-
-
0028514601
-
"Kerberos: An Authentication Service for Computer Networks"
-
Sept
-
C. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm., vol. 32, no. 9, pp. 33-38, Sept. 1994.
-
(1994)
IEEE Comm.
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, C.1
Ts'o, T.2
-
23
-
-
0142094198
-
"Energy-Aware Management in Cluster-Based Sensor Networks"
-
Dec
-
M. Younis, M. Youssef, and K. Arisha, "Energy-Aware Management in Cluster-Based Sensor Networks," Computer Networks, vol. 43, no. 5, pp. 649-668, Dec. 2003.
-
(2003)
Computer Networks
, vol.43
, Issue.5
, pp. 649-668
-
-
Younis, M.1
Youssef, M.2
Arisha, K.3
-
24
-
-
0345565893
-
"A Survey of Key Management for Secure Group Communication"
-
Sept
-
S. Rafaeli and D. Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sept. 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
25
-
-
0003460574
-
"Group Key Management Protocol (GKMP) Specification"
-
Report # RFC 2093, The Internet Soc. (ISOC)
-
H. Harney and C. Muckenhirn, "Group Key Management Protocol (GKMP) Specification," Report # RFC 2093, The Internet Soc. (ISOC), 1997.
-
(1997)
-
-
Harney, H.1
Muckenhirn, C.2
-
26
-
-
0003978251
-
"Key Management for Multicast: Issues and Architectures"
-
Report # RFC 2627, The Internet Soc. (ISOC), Reston, Va
-
D. Wallner, E Harder, and R. Agee, "Key Management for Multicast: Issues and Architectures," Report # RFC 2627, The Internet Soc. (ISOC), Reston, Va., 1999.
-
(1999)
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
27
-
-
0033893174
-
"Secure Group Communications Using Key Graphs"
-
Feb
-
K. Wong, M. Gouda, and S. Lam, "Secure Group Communications Using Key Graphs," IEEE/ACM Trans. Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
-
(2000)
IEEE/ACM Trans. Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, K.1
Gouda, M.2
Lam, S.3
-
29
-
-
0034838199
-
"ELK, A New Protocol for Efficient Large-Group Key Distribution"
-
May
-
A. Perrig, D. Song, and J. Tygar, "ELK, A New Protocol for Efficient Large-Group Key Distribution," Proc. IEEE Symp. Security and Privacy, May 2001.
-
(2001)
Proc. IEEE Symp. Security and Privacy
-
-
Perrig, A.1
Song, D.2
Tygar, J.3
-
30
-
-
0344908112
-
"MARKS: Multicast Key Management Using Arbitrarily Revealed Key Sequences"
-
Nov
-
B. Brisco, "MARKS: Multicast Key Management Using Arbitrarily Revealed Key Sequences," Proc. First Int'l Workshop Networked Group Comm., Nov. 1999.
-
(1999)
Proc. First Int'l Workshop Networked Group Comm.
-
-
Brisco, B.1
-
35
-
-
0033690336
-
"Efficient Authentication and Signing of Multicast Streams over Lossy Channels"
-
May
-
A. Perrig, R. Canetti, J.D. Tygar, and D. Song, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels," Proc. IEEE Symp. Security and Privacy, May 2000.
-
(2000)
Proc. IEEE Symp. Security and Privacy
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
36
-
-
0036738266
-
"SPINS: Security Protocols for Sensor Networks"
-
Sept
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar, "SPINS: Security Protocols for Sensor Networks," J. Wireless Networks, vol. 8, no. 5, pp. 521-534, Sept. 2002.
-
(2002)
J. Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
37
-
-
2942656255
-
"Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures"
-
Sept
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," J. Ad-Hoc Networks, vol. 1, nos. 2-3, pp. 293-315, Sept. 2003.
-
(2003)
J. Ad-Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
39
-
-
3042783638
-
"A Pairwise Key Predistribution Scheme for Wireless Sensor Networks"
-
Oct
-
W. Du, J. Deng, Y.S. Han, and P.K. Varshney, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), Oct. 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03)
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
43
-
-
3042575345
-
"Establishing Pair-Wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach"
-
Technical Report ISE-TR-03-01, George Mason Univ., Mar
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia "Establishing Pair-Wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach," Technical Report ISE-TR-03-01, George Mason Univ., Mar. 2003.
-
(2003)
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
44
-
-
27644505653
-
"Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust"
-
SDL Technical Report SRI-SDL-04-02, Apr
-
B. Dutertre, S. Cheung, and J. Levy, "Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust," SDL Technical Report SRI-SDL-04-02, Apr. 2004.
-
(2004)
-
-
Dutertre, B.1
Cheung, S.2
Levy, J.3
-
45
-
-
85016596484
-
"LiSP: A Lightweight Security Protocol for Wireless Sensor Networks"
-
Aug
-
T. Park and K.G. Shin, "LiSP: A Lightweight Security Protocol for Wireless Sensor Networks," ACM Trans. Embedded Computing Systems, vol. 3, no. 3, pp. 634-660, Aug. 2004.
-
(2004)
ACM Trans. Embedded Computing Systems
, vol.3
, Issue.3
, pp. 634-660
-
-
Park, T.1
Shin, K.G.2
-
46
-
-
15744395962
-
"TEA Extensions"
-
technical report, Computer Laboratory, Univ. of Cambridge, Oct
-
R.M. Needham and D.J. Wheeler, "TEA Extensions," technical report, Computer Laboratory, Univ. of Cambridge, Oct. 1997.
-
(1997)
-
-
Needham, R.M.1
Wheeler, D.J.2
-
47
-
-
0004102023
-
"The RC6 Block Cipher"
-
Aug
-
R. Rivest, M.J.B. Robshaw, R. Sidney, and Y.L. Lin, "The RC6 Block Cipher," Proc. First Advanced Encryption Standard (AES) Conf., Aug. 1998.
-
(1998)
Proc. First Advanced Encryption Standard (AES) Conf.
-
-
Rivest, R.1
Robshaw, M.J.B.2
Sidney, R.3
Lin, Y.L.4
|