-
1
-
-
85177172614
-
-
N. Borisov, I. Goldberg, D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: Proceedings of IEEE/ACM MobiCom, Italy, July 2001, pp. 180-189.
-
-
-
-
2
-
-
85177503976
-
-
Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of IEEE/ACM MobiCom, Boston MA, August 2000, pp. 275-283.
-
-
-
-
3
-
-
84966668611
-
-
R. Zhang, D. Qian, C. Bao, W. Wu, X. Guo, Multi-agent based intrusion detection architecture, in: Proceedings International Conference on Computer Networks and Mobile Computing, Beijing China, October 2001, pp. 494-501.
-
-
-
-
4
-
-
14844315770
-
-
S. Ganeriwal, M. Srivastava, Reputation-based framework for high integrity sensor networks, in: Proceedings of 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, October 2004, pp. 66-77.
-
-
-
-
5
-
-
34250643925
-
-
D. Johnson, D. Maltz, Y. Hu, The dynamic source routing protocol for mobile ad hoc networks (DSR), (Internet-Draft). Mobile Ad-hoc Network (MANET) Working Group, IETF, July 2004.
-
-
-
-
6
-
-
85016596484
-
-
T. Park, K. Shin, LiSP: a lightweight security protocol for wireless sensor networks, in: ACM Transactions on Embedded Computing Systems, vol. 3, no. 3, August 2004, pp. 634-660.
-
-
-
-
7
-
-
0038341106
-
-
L. Eschenauer, V.D. Gligor. A key-management scheme for distributed MSN networks, in: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), Washington DC, November 2002, pp. 41-47.
-
-
-
-
8
-
-
34250648049
-
-
G. Jolly, M. Kusu, P. Kokate, A hierarchical key management method for low-energy wireless MSN networks, in: Proceedings of the 8th IEEE Symposium on Computers and Communication (ISCC), Turkey, July, 2003, pp. 335-340.
-
-
-
-
9
-
-
3042592224
-
-
M. Eltoweissy, A. Wadaa, S. Olariu, L. Wilson, Scalable cryptographic key management in wireless sensor networks, in: Proceedings of Distributed Computing Systems Workshops, Tokyo Japan, March 2004.
-
-
-
-
10
-
-
34250660905
-
-
W. Heinzelman, Application-specific protocol architectures for wireless networks, Ph.D. Dissertation, Massachusetts Institute of Technology, June 2000.
-
-
-
-
11
-
-
84961616351
-
-
S. Madden, R. Szewczyk, M. Franklin, D. Culler, Supporting aggregate queries over ad-hoc wireless MSN networks, in: Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon NY, June 2002, pp. 49-58.
-
-
-
-
12
-
-
17444366210
-
Training a sensor network
-
Wadaa A., Olariu S., Wilson L., Eltoweissy M., and Jones K. Training a sensor network. Mobile Networks and Applications 10 1 (2005) 151-168
-
(2005)
Mobile Networks and Applications
, vol.10
, Issue.1
, pp. 151-168
-
-
Wadaa, A.1
Olariu, S.2
Wilson, L.3
Eltoweissy, M.4
Jones, K.5
-
13
-
-
3543105535
-
Combinatorial optimizations of group key management
-
Eltoweissy M., Heydari H., Morales L., and Sudborough H. Combinatorial optimizations of group key management. Journal of Networks and Systems Management 12 1 (2004) 30-50
-
(2004)
Journal of Networks and Systems Management
, vol.12
, Issue.1
, pp. 30-50
-
-
Eltoweissy, M.1
Heydari, H.2
Morales, L.3
Sudborough, H.4
-
14
-
-
2442478355
-
-
M. Eltoweissy, M. Younis, K. Ghumman, Lightweight key management for wireless MSN networks, in: Proceedings of IEEE International Conference on Performance, Computing, and Communications, Phoenix AZ, April 2004, pp. 813-818.
-
-
-
-
15
-
-
34250632345
-
-
M. Moharram, M. Eltoweissy, Key management schemes in sensor networks: dynamic versus static keying, in: ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN 2005), Montreal Canada, October 2005.
-
-
-
-
16
-
-
10044284351
-
-
S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed MSN networks, in: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), Washington DC, October 2003, pp. 62-72.
-
-
-
-
17
-
-
34250621976
-
-
R. Moharrum, M. Mukkamala, M. Eltoweissy, CKDS: an efficient combinatorial key distribution scheme for wireless, in: Proceedings of International Conference on Performance, Computing, and Communications, Phoenix AZ, April 2004, pp. 630-636.
-
-
-
-
18
-
-
34250636663
-
-
D. Carman, P. Kruus, B. Matt, Constraints and approaches for distributed MSN network security, Network Associates Inc. (NAI) Labs Technical Report No.00010. September 2000.
-
-
-
-
19
-
-
11244265814
-
-
F. Kuhn, T. Moscibroda, R. Wattenhoffer, Initializing newly deployed ad hoc and sensor networks, in: Proceedings of International Conference on Mobile Computing and Networking (MobiCom04), Philadelphia PA, September 2004, pp. 260-274.
-
-
-
-
21
-
-
34250617030
-
-
B. Matt, A preliminary study of identity-based, group key establishment protocols for resource constrained battlefield networks, Network Associates Labs Technical Report 02-034, September 2002.
-
-
-
-
22
-
-
34250648048
-
-
D. Carman, B. Matt, G. Cirincione, Energy-efficient and low-latency key management for MSN networks, in: Proceedings of 23rd Army Science Conference, Orlando FL, December 2002.
-
-
-
-
23
-
-
28444433009
-
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for MSN networks, in: Proceedings of IEEE Symposium on Security and Privacy, Oakland CA, May 2003, pp. 197-213.
-
-
-
-
24
-
-
8344262333
-
-
W. Du, J. Deng, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Proceedings of IEEE INFOCOM'04, March 2004.
-
-
-
-
25
-
-
3042822764
-
-
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proceedings of ACM Conference on Computer and Communications Security (CCS), Washington DC, October 2003, pp. 52-61.
-
-
-
-
26
-
-
84858389516
-
-
G. Gupta, M. Younis, Performance evaluation of load-balanced clustering of wireless MSN networks, in: Proceedings of 10th International Conference on Telecommunications, Papeete, French Polynesia, February 2003, pp. 1577-1581.
-
-
-
-
27
-
-
34250633971
-
-
D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Next century challenges: scalable coordination in sensor networks, in: Proceedings of 5th International Conference on Mobile Computing and Networks (MobiCom), Seattle WA, August 1999, pp. 263-270.
-
-
-
-
28
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig A., Szewczyk R., Wen V., Culler D., and Tygar J. SPINS: security protocols for sensor networks. Wireless Networks 8 5 (2002) 521-534
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
29
-
-
34250673522
-
-
Sensoria corporation, WINS NG Power Usage Specification: WINS NG 1.0, January 2000. .
-
-
-
-
30
-
-
0041438298
-
-
J. Chou, D. Petrovis, K. Ramchandran, A distributed and adaptive signal processing approach to reducing energy consumption in sensor networks, in: Proceedings of IEEE INFOCOM, vol. 2, San Francisco CA, April 2003, pp. 1054-1062.
-
-
-
-
31
-
-
85034572933
-
-
W. Heinzelman, A. Chandrakasan, H. Balakrishnan, An application-specific protocol architecture for wireless microsensor networks, in: Proceedings of 33rd Hawaii International Conference on System Sciences, Maui HI, January 2000, pp. 3005-3014.
-
-
-
-
32
-
-
2942656255
-
Secure routing in wireless sensor networks: attacks and countermeasures
-
Karl C., and Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks Journal 1 1 (2003) 293-315
-
(2003)
Ad Hoc Networks Journal
, vol.1
, Issue.1
, pp. 293-315
-
-
Karl, C.1
Wagner, D.2
-
33
-
-
0036793924
-
Denial of service in sensor networks
-
Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Computer 35 10 (2002) 54-62
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
34
-
-
0033893174
-
-
C.K. Wong, M. Gouda, S. Lam, Secure group communications using key graphs, in: Proceedings of IEEE Transactions on Networking, vol 8, no. 1, February 2000, pp. 16-29.
-
-
-
-
35
-
-
34250620027
-
-
H. Harney, C. Muckhenhirn, Group key management protocol (GKMP) Specification, RFC 2093, July 1997.
-
-
-
-
36
-
-
4444278670
-
-
Y.T. Hou, Y. Shi, H.D. Sherali, Rate allocation in wireless sensor networks with network lifetime requirement, in: Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Tokyo Japan, May 2004, pp. 67-77.
-
-
-
-
37
-
-
1542358975
-
-
J. Pan, Y.T. Hou, L. Cai, Y. Shi, S.X. Shen, Topology control for wireless sensor networks, in: Proceedings of ACM International Conference on Mobile Computing and Networking (Mobicom), San Diego CA, September 2003, pp. 286-299.
-
-
-
|