-
1
-
-
17744386714
-
-
R. Anderson, H. Chan, A. Perrig, Key infection: smart trust for smart dust, IEEE International Conference on Network Protocols (ICNP 2004), 2004.
-
-
-
-
2
-
-
28444433009
-
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, May 2003, pp. 197-213.
-
-
-
-
3
-
-
84944414611
-
-
B. Deb, S. Bhatnagar, B. Nath, ReInForM: reliable information forwarding using multiple paths in sensor networks, IEEE International Conference on Local Computer Networks (LCN 2003), October 2003, pp. 406-415.
-
-
-
-
4
-
-
35248846963
-
-
J. Deng, R. Han, S. Mishra, A performance evaluation of intrusion-tolerant routing in wireless sensor networks, Second International Workshop on Information Processing in Sensor Networks (IPSN 03), April 2003, pp. 349-364.
-
-
-
-
5
-
-
33751166205
-
-
J. Deng, R. Han, S. Mishra, Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks, IEEE International Conference on Dependable Systems and Networks (DSN), 2004, pp. 594-603.
-
-
-
-
6
-
-
0038341106
-
-
L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, ACM Conference on Computer and Communication Security (CCS), November 2002, pp. 41-47.
-
-
-
-
7
-
-
33751174786
-
-
K. Fall, K. Varadhan (Eds.), NS notes and documentation, The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, July 1999. Available from: .
-
-
-
-
8
-
-
33751181698
-
-
D. Ganesan, R. Govindan, S. Shenker, D. Estrin, Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks, Mobile Computing and Communications Review (MC2R), vol. 1, 2002, pp. 11-25.
-
-
-
-
9
-
-
33751186735
-
-
C. Hartung, J. Balasalle, R. Han, Node compromise in sensor networks: the need for secure systems, Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder, January 2005.
-
-
-
-
10
-
-
84961572484
-
-
Y.-C. Hu, D. B. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad-hoc networks, IEEE Workshop on Mobile Computing Systems and Applications, June 2002, pp. 3-13.
-
-
-
-
11
-
-
33751186944
-
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Efficient security mechanisms for routing protocols, NDSS 2003, February 2003, pp. 57-73.
-
-
-
-
12
-
-
0041973497
-
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless ad-hoc networks, IEEE Computer and Communications Societies (INFOCOM 2003), March 2003, pp. 1976-1986.
-
-
-
-
13
-
-
33751173461
-
-
D. Johnson, D.A. Maltz, J. Broch, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (Internet-Draft), Mobile Ad-hoc Network (MANET) Working Group, IETF, October1999.
-
-
-
-
14
-
-
84942426861
-
-
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, IEEE International Workshop on Sensor Network Protocols and Applications, May 2003, pp. 113-127.
-
-
-
-
15
-
-
26444574670
-
-
C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, ACM Conference on Embedded Networked Sensor Systems (SensSys 2004), November 2004, pp. 162-175.
-
-
-
-
16
-
-
33751173023
-
-
S.-B. Lee, Y.-H. Choi, ARMS: An authenticated routing message in sensor networks, Secure Mobile Ad-hoc Networks and Sensors Workshop (MADNES'05), Lecture Notes in Computer Science, Springer, September 2005.
-
-
-
-
17
-
-
3042822764
-
-
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, ACM Conference on Computer and Communications Security (CCS), October 2003, pp. 52-61.
-
-
-
-
18
-
-
85000276942
-
-
D. Liu, P. Ning, Multi-Level u-TESLA: a broadcast authentication system for distributed sensor networks, ACM Transactions in Embedded Computing Systems (TECS), vol. 3 (4), 2004, pp. 800-836.
-
-
-
-
19
-
-
85177502874
-
-
S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
-
-
-
-
20
-
-
84920380941
-
-
R. Merkle, Protocols for public key cryptosystems, IEEE Symposium on Research in Security and Privacy, April 1980, pp. 122-136.
-
-
-
-
21
-
-
3042785862
-
-
J. Newsome, E. Shi, D. Song, A. Perrig, The sybil attack in sensor networks: analysis and defenses, IEEE Conference on Information Processing in Sensor Networks (IPSN), April 2004, pp. 259-268.
-
-
-
-
22
-
-
27544460282
-
-
B. Parno, A. Perrig, V. Gligor, Distributed detection of node replication attacks in sensor networks, IEEE Symposium on Security and Privacy, May 2005, pp. 49-63.
-
-
-
-
23
-
-
85031307530
-
-
C.E. Perkins, P. Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications, August 1994, pp. 234-244.
-
-
-
-
24
-
-
0033690336
-
-
A. Perrig, R. Canetti, J.D. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, IEEE Symposium on Security and Privacy, May 2000, pp. 56-73.
-
-
-
-
25
-
-
33751179239
-
-
A. Perrig, R. Canetti, D. Song, J.D. Tygar, Efficient and secure source authentication for multicast, Network and Distributed System Security Symposium, NDSS01, February 2001, pp. 35-46.
-
-
-
-
26
-
-
4243082091
-
Security in wireless sensor networks
-
Special Issue on Wireless Sensor Networks
-
Perriig A., Stankovic J., and Wagner D. Security in wireless sensor networks. Communications of the ACM 47 6 (2004) 53-57 Special Issue on Wireless Sensor Networks
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perriig, A.1
Stankovic, J.2
Wagner, D.3
-
27
-
-
85177178924
-
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: Security Protocols for Sensor Networks, International Conference on Mobile Computing and Networking (MobiCom 2001), 2001, pp. 189-199.
-
-
-
-
28
-
-
33751164880
-
-
R. Rivest, The MD5 message-digest algorithm, RFC 1321, Internet Engineering Task Force, 1992.
-
-
-
-
29
-
-
11144340927
-
Designing secure sensor networks, wireless communications
-
Shi E., and Perrig A. Designing secure sensor networks, wireless communications. IEEE 11 6 (2004) 38-43
-
(2004)
IEEE
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
30
-
-
0036986435
-
-
J. Staddon, D. Balfanz, G. Durfee, Efficient tracing of failed nodes in sensor networks, ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), ACM Press, 2002, pp. 122-130.
-
-
-
-
31
-
-
0036793924
-
Denial of service in sensor networks
-
Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Computer 35 10 (2002) 54-62
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
32
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
Yang H., Ye F., Yuan Y., Lu S., and Arbough W. Toward resilient security in wireless sensor networks. ACM MobiHoc'05 (2005) 34-45
-
(2005)
ACM MobiHoc'05
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbough, W.5
-
33
-
-
10044284351
-
-
S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, ACM Conference on Computer and Communications Security (CCS'03), October 2003.
-
-
-
|