-
1
-
-
0034546898
-
Intrusion Detection in Wireless AdHoc Networks
-
Y. Zhang and W. Lee. Intrusion Detection in Wireless AdHoc Networks. In Proc. ACM MobiCom, pages 275-283, 2000.
-
(2000)
Proc. ACM MobiCom
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
4
-
-
3543056512
-
An interleaved hopby-hop authentication scheme for filtering of injected false data in sensor networks
-
S. Zhu, S. Setia, S. Jajodia and N. Peng. An interleaved hopby-hop authentication scheme for filtering of injected false data in sensor networks. In Proc. of IEEE Symposium on Security and Privacy, pages 259-271, 2004.
-
(2004)
Proc. of IEEE Symposium on Security and Privacy
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Peng, N.4
-
5
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu and L. Zhang. Statistical en-route filtering of injected false data in sensor networks. In Proc. of IEEE InfoCom, 2004.
-
(2004)
Proc. of IEEE InfoCom
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
7
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
H. Yang, F. Ye, Y. Yuan, S. Lu and W. Arbaugh. Toward resilient security in wireless sensor networks. In Proc. of ACM MobiHoc, pages 34-45, 2005.
-
(2005)
Proc. of ACM MobiHoc
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
9
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
C. Intanagonwiwat, R. Govindan and D. Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proc. of ACM MobiCom, pages 56-67, 2000.
-
(2000)
Proc. of ACM MobiCom
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
10
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
B. Karp and H.T. Kung. GPSR: greedy perimeter stateless routing for wireless networks. In Proc. of ACM MobiCom, pages 243-254, 2000.
-
(2000)
Proc. of ACM MobiCom
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
13
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of ACM MobiHoc, pages 46-57, 2005.
-
(2005)
Proc. of ACM MobiHoc
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
14
-
-
33745949686
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
Y. W. Law, L. V. Hoesel, J. Doumen, P. Hartel and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. In Proc. of the 3rd ACM on the Security of Ad Hoc and Sensor Networks (SASN 05), pages 76-88, 2005.
-
(2005)
Proc. of the 3rd ACM on the Security of Ad Hoc and Sensor Networks (SASN 05)
, pp. 76-88
-
-
Law, Y.W.1
Hoesel, L.V.2
Doumen, J.3
Hartel, P.4
Havinga, P.5
-
15
-
-
25844439422
-
Secure Positioning of Wireless Devices with Application to Sensor Networks
-
S. Capkun, J. Hubaux. Secure Positioning of Wireless Devices with Application to Sensor Networks. In Proc. IEEE InfoCom, 2005.
-
(2005)
Proc. IEEE InfoCom
-
-
Capkun, S.1
Hubaux, J.2
-
16
-
-
33144472210
-
Secure Time Synchronization Service for Sensor Networks
-
S. Ganeriwal, S. Capkun, C. Han, M. B. Srivastava. Secure Time Synchronization Service for Sensor Networks. In Proc. of the 4th ACM workshop on Wireless Security (WiSe 06), pages 97-106, 2006.
-
(2006)
Proc. of the 4th ACM workshop on Wireless Security (WiSe 06)
, pp. 97-106
-
-
Ganeriwal, S.1
Capkun, S.2
Han, C.3
Srivastava, M.B.4
-
18
-
-
14844303406
-
-
C. Ozturk, Y. Zhang, W. Trappe. Source-Location Privacy in Energy-Constrained Sensor Network Routing. In Proc. of SASN 04, pages 88-93, 2004.
-
C. Ozturk, Y. Zhang, W. Trappe. Source-Location Privacy in Energy-Constrained Sensor Network Routing. In Proc. of SASN 04, pages 88-93, 2004.
-
-
-
-
19
-
-
0003605145
-
Constructing digital signatures from one-way function
-
SRI-CSL-98, SRI International, Oct
-
L. Lamport. Constructing digital signatures from one-way function, in technical report SRI-CSL-98, SRI International, Oct. 1979.
-
(1979)
in technical report
-
-
Lamport, L.1
-
20
-
-
27544432072
-
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
-
J. M. McCune, E. Shi, A. Perrig, M. K. Reiter. Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. In Proc. of IEEE Symposium on Security and Privacy, pages 64-78, 2005.
-
(2005)
Proc. of IEEE Symposium on Security and Privacy
, pp. 64-78
-
-
McCune, J.M.1
Shi, E.2
Perrig, A.3
Reiter, M.K.4
|