-
1
-
-
2942686425
-
Sensor networks: Evolution, opportunities, and challenges
-
Chong CY, Kumar SP. Sensor networks: Evolution, opportunities, and challenges. Proc. of the IEEE, 2003, 91(8): 1247-1256.
-
(2003)
Proc. of the IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.P.2
-
3
-
-
0142060789
-
Wireless sensor networks
-
Chinese source
-
Ren FY, Huang HN, Lin C. Wireless sensor networks. Journal of Software, 2003, 14(7): 1282-1291 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/1282.htm.
-
(2003)
Journal of Software
, vol.14
, Issue.7
, pp. 1282-1291
-
-
Ren, F.Y.1
Huang, H.N.2
Lin, C.3
-
4
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome: ACM Press
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security protocols for sensor networks. In: Proc. of the 7th Annual Int'l Conf. on Mobile Computing and Networks. Rome: ACM Press, 2001. 189-199.
-
(2001)
Proc. of the 7th Annual Int'l Conf. on Mobile Computing and Networks
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
5
-
-
33846154012
-
The official website of the ZigBee alliances
-
The official website of the ZigBee alliances. http://www.zigbee.org.
-
-
-
-
6
-
-
3142684688
-
Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks
-
Doumit S, Agrawal DP. Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks. MILCOM 2003-IEEE Military Communications Conf., 2003, 22(1): 609-614.
-
(2003)
MILCOM 2003-IEEE Military Communications Conf.
, vol.22
, Issue.1
, pp. 609-614
-
-
Doumit, S.1
Agrawal, D.P.2
-
7
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: A survey. Computer Networks, 2002, 38(4): 393-422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
8
-
-
1542286901
-
Fast authenticated key establishment protocols for wireless sensor networks
-
San Diego: ACM Press
-
Huang Q, Cukier J, Kobayashi H, Liu BD, Zhang JY. Fast authenticated key establishment protocols for wireless sensor networks. In: Proc. of the 2nd ACM Int'l Conf. on Wireless Sensor Networks and Applications. San Diego: ACM Press, 2003. 141-150.
-
(2003)
Proc. of the 2nd ACM Int'l Conf. on Wireless Sensor Networks and Applications
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.D.4
Zhang, J.Y.5
-
11
-
-
1542376949
-
Analyzing and modeling encryption overhead for sensor network nodes
-
Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F, Sichitiu M. Analyzing and modeling encryption overhead for sensor network nodes. In: Proc. of the WSNA. 2003. 151-159.
-
(2003)
Proc. of the WSNA
, pp. 151-159
-
-
Ganesan, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
12
-
-
31344462815
-
Block ciphers and stream ciphers: The state of the art
-
Biryukov A. Block ciphers and stream ciphers: The state of the art. http://www.esat.kuleuven.ac.be/-abiryuko/lecturenotes.pdf.
-
-
-
Biryukov, A.1
-
13
-
-
12444271857
-
Energy efficient data encryption algorithms
-
Chen X, Woo T. Energy efficient data encryption algorithms. 2002. http://www.vlsi.uwaterloo.ca/thwoo/ece750report.pdf.
-
(2002)
-
-
Chen, X.1
Woo, T.2
-
14
-
-
35548943337
-
A public-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography
-
Malan DJ, Welsh M, Smith MD. A public-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography. http://airclic.eecs.harvard.edu/publications/secon04.pdf.
-
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
15
-
-
84934298201
-
Technology MICA2: Wireless measurement system
-
Crossbow I. Technology MICA2: Wireless measurement system. http://www.xbow.com/ Products/Product_pdf_files/Wireless_pdf/6020-0042-04_A_MICA2.pdf.
-
-
-
Crossbow, I.1
-
17
-
-
33846137573
-
Advanced research on distributed sensor network security
-
NAI Laboratory
-
NAI Laboratory. Advanced research on distributed sensor network security. http://www.networkassociates.com/ us/_tier0/nailabs/_media/documents/dsns.pdf.
-
-
-
-
18
-
-
0022793132
-
How to construct random functions
-
Goldreich O, Goldwasser S, Micali S. How to construct random functions. Journal of the ACM, 1986, 33(4): 792-807.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
19
-
-
85016596484
-
LiSP: A light-weight security protocol for wireless sensor networks
-
Park TJ, Arbor A, Shim IB. LiSP: A light-weight security protocol for wireless sensor networks. ACM Trans. on Embedded Computing Systems, 2004, 3(3): 634-660.
-
(2004)
ACM Trans. on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 634-660
-
-
Park, T.J.1
Arbor, A.2
Shim, I.B.3
-
22
-
-
85028765277
-
Perfectly-Secure key distribution for dynamic conferences
-
Santa Barbara: LNCS
-
Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly-Secure key distribution for dynamic conferences. In: Advances in Cryptology-CRYPTO'92. Santa Barbara: LNCS, 1992. 471-486.
-
(1992)
Advances in Cryptology-CRYPTO'92
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
23
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
Liu DG, Ning P, Li RF. Establishing pairwise keys in distributed sensor networks. ACM Trans. on Information and System Security, 2005, 8(1): 41-77.
-
(2005)
ACM Trans. on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.G.1
Ning, P.2
Li, R.F.3
-
24
-
-
56349114567
-
Location-Based pairwise key establishments for static sensor networks
-
Liu DG, Ning P. Location-Based pairwise key establishments for static sensor networks. http://discovery.csc.ncsu.edu/-pning/pubs/sasn03.pdf.
-
-
-
Liu, D.G.1
Ning, P.2
-
26
-
-
33846147588
-
Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
-
Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach. http://www.cse.psu.edu/-wezhang/papers/paper-infocom05.pdf.
-
-
-
Zhang, W.1
Cao, G.2
-
28
-
-
84871442641
-
On communication security in wireless ad-hoc sensor network
-
Pittsburgh: IEEE Computer Society
-
Slijepcevic S, Potkonjak M, Tsiatsis V, Zimbeck S, Srivastava MB. On communication security in wireless ad-hoc sensor network. In: Proc. of the 11th IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002). Pittsburgh: IEEE Computer Society, 2002. 139-144.
-
(2002)
Proc. of the 11th IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002)
, pp. 139-144
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.B.5
-
29
-
-
33846133142
-
Energy-Efficient security protocol for wireless sensor networks
-
Cam H, Ozdemir S, Muthuavinashiappan D, Nair P. Energy-Efficient security protocol for wireless sensor networks. http://www.eas.asu.edu/-hasancam/ publications/security_sensor-2003.pdf.
-
-
-
Cam, H.1
Ozdemir, S.2
Muthuavinashiappan, D.3
Nair, P.4
-
30
-
-
30344445246
-
Enhancing base station security in wireless sensor networks
-
Deng J, Han R, Mishra S. Enhancing base station security in wireless sensor networks. http://www.cs.colorado.edu/department/ publications/reports/docs/CU-CS-951-03.pdf.
-
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
31
-
-
0036793924
-
Denial of service in sensor networks
-
Wood AD, Stankovic JA. Denial of service in sensor networks. IEEE Computer, 2002, 35(10): 54-62.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
|