-
2
-
-
0014814325
-
Space/Time Trade-offs in Hash Coding with Allowable Errors
-
Burton H. Bloom, Space/Time Trade-offs in Hash Coding with Allowable Errors, Communication of the ACM, vol. 13, 422-426, 1970
-
(1970)
Communication of the ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
4
-
-
0038487088
-
Random Key Predistribution Schemes for Sensor Networks
-
May
-
H. Chan, A. Perrig, and D. Song, Random Key Predistribution Schemes for Sensor Networks, IEEE Symposium on Security and Privacy, pp. 197-213, May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
5
-
-
84944414611
-
ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks
-
Oct
-
B. Deb, S. Bhatnagar, and B. Nath, ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks, IEEE Local Computer Networks (LCN 2003), pp. 406-415, Oct. 2003.
-
(2003)
IEEE Local Computer Networks (LCN
, pp. 406-415
-
-
Deb, B.1
Bhatnagar, S.2
Nath, B.3
-
6
-
-
35248846963
-
A Performance Evaluation of Intrusion- Tolerant Routing in Wireless Sensor Networks
-
Apr
-
J. Deng, R. Han, and S. Mishra, A Performance Evaluation of Intrusion- Tolerant Routing in Wireless Sensor Networks, 2nd International Workshop on Information Processing in Sensor Networks (IPSN 03), pp. 349-364, Apr. 2003.
-
(2003)
2nd International Workshop on Information Processing in Sensor Networks (IPSN 03)
, pp. 349-364
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
7
-
-
4544298056
-
Intrusion Tolerance and Anti- Traffic Analysis Strategies for Wireless Sensor Networks
-
J. Deng, R. Han, and S. Mishra, Intrusion Tolerance and Anti- Traffic Analysis Strategies for Wireless Sensor Networks, IEEE International Conference on Dependable Systems and Networks (DSN), pp. 594-603, 2004.
-
(2004)
IEEE International Conference on Dependable Systems and Networks (DSN)
, pp. 594-603
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
9
-
-
0004194997
-
-
K. Fall and K. Varadhan editors, The VINT project, LBL, Feb
-
K. Fall and K. Varadhan (editors), NS notes and documentation, The VINT project, LBL, Feb 2000, http://www.isi.edu/nsnam/ns/
-
(2000)
NS notes and documentation
-
-
-
10
-
-
0013043106
-
-
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks, Computing and Communications Review (MC2R-) Vol 1., pp. 11-25, 2002.
-
(2002)
Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks, Computing and Communications Review (MC2R-)
, vol.1
, pp. 11-25
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
12
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, and S. Micali, How to Construct Random Functions, Journal of the ACM, Vol. 33, No. 4, 210-217, 1986
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
0038341106
-
-
L. Eschenauer and V. D. Gligor, A Key-Management Scheme for Distributed Sensor Networks, 9th ACM Conference on Computer and Communication Security (CCS), pp. 41-47, Nov. 2002.
-
L. Eschenauer and V. D. Gligor, A Key-Management Scheme for Distributed Sensor Networks, 9th ACM Conference on Computer and Communication Security (CCS), pp. 41-47, Nov. 2002.
-
-
-
-
14
-
-
33745639957
-
Node Compromise in Sensor Networks: The Need for Secure Systems
-
Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder, Jan
-
C. Hartung, J. Balasalle, and R. Han, Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder, Jan. 2005
-
(2005)
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
15
-
-
4544317953
-
-
June
-
T. He, S. Krishnamurthy, J. A. Stankovic, T. F. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui, and B. Krogh, An Energy-Efficient Surveillance System Using Wireless Sensor Networks, ACM MobiSys'04, June, 2004
-
(2004)
An Energy-Efficient Surveillance System Using Wireless Sensor Networks, ACM MobiSys'04
-
-
He, T.1
Krishnamurthy, S.2
Stankovic, J.A.3
Abdelzaher, T.F.4
Luo, L.5
Stoleru, R.6
Yan, T.7
Gu, L.8
Hui, J.9
Krogh, B.10
-
16
-
-
34547517686
-
-
W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive Protocols for Information Dissemination in Wireless Sensor Networks, ACM MobiCom99, pp. 174.185, 1999.
-
W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive Protocols for Information Dissemination in Wireless Sensor Networks, ACM MobiCom99, pp. 174.185, 1999.
-
-
-
-
17
-
-
0002360279
-
System Architecture Directions for Networked Sensors
-
November
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, System Architecture Directions for Networked Sensors, ACU ASPLOS IX, November 2000.
-
(2000)
ACU ASPLOS
, vol.9
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
18
-
-
84879386002
-
Load Balanced, Energy-Aware Communications for Mars Sensor Networks
-
X. Hong, M. Gerla, W. Hanbiao, and L. Clare, Load Balanced, Energy-Aware Communications for Mars Sensor Networks, IEEE Aerospace Conference, vol.3, 1109-1115, 2002.
-
(2002)
IEEE Aerospace Conference
, vol.3
, pp. 1109-1115
-
-
Hong, X.1
Gerla, M.2
Hanbiao, W.3
Clare, L.4
-
19
-
-
84961572484
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
Jun
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, IEEE Workshop on Mobile Computing Systems and Applications, pp. 3-13, Jun. 2002.
-
(2002)
IEEE Workshop on Mobile Computing Systems and Applications
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
20
-
-
17444429272
-
-
Feb
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, Efficient Security Mechanisms for Routing Protocols, NDSS 2003, pp. 57-73, Feb. 2003.
-
(2003)
Efficient Security Mechanisms for Routing Protocols
, vol.NDSS 2003
, pp. 57-73
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
22
-
-
0003597247
-
-
Mobile Ad-hoc Network (MANET) Working Group, IETF, Oct
-
D. Johnson, D.A. Maltz, and J. Broch, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (Internet-Draft), Mobile Ad-hoc Network (MANET) Working Group, IETF, Oct. 1999.
-
(1999)
The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (Internet-Draft)
-
-
Johnson, D.1
Maltz, D.A.2
Broch, J.3
-
24
-
-
26444574670
-
-
Nov
-
C. Karlof, N. Sastry, and D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, ACM SensSys'04, pp. 162-175, Nov. 2004.
-
(2004)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, ACM SensSys'04
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
25
-
-
33847326821
-
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks
-
Sep
-
I. Khalil, S. Bagchi, and C. Nina-Rotaru, DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks, IEEE SecureComm 2005, pp. 89-100, Sep. 2005
-
(2005)
IEEE SecureComm
, pp. 89-100
-
-
Khalil, I.1
Bagchi, S.2
Nina-Rotaru, C.3
-
26
-
-
11244314074
-
A Priority-Based Multi-Path Routing Protocol for Sensor Networks
-
Y. Liu and W. K.G. Seah, A Priority-Based Multi-Path Routing Protocol for Sensor Networks, 15th IEEE International Symposium on Volume 1, 216-220, 2004
-
(2004)
15th IEEE International Symposium on
, vol.1
, pp. 216-220
-
-
Liu, Y.1
Seah, W.K.G.2
-
28
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
S. Marti, T.J. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255-265, 2000
-
(2000)
ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
29
-
-
34547527115
-
2 RC: Multiplicative-Increase/Additive-Decrease Multipath Routing Control for Wireless Sensor Networks
-
ACM SIGBED, Jan
-
2 RC: Multiplicative-Increase/Additive-Decrease Multipath Routing Control for Wireless Sensor Networks, ACM SIGBED Review, Vol. 2, Jan 2005.
-
(2005)
Review
, vol.2
-
-
Morcos, H.1
Matta, I.2
Bestavros, A.3
-
30
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis and Defenses
-
Apr
-
J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defenses, IEEE IPSN'04, pp. 259-268, Apr. 2004.
-
(2004)
IEEE IPSN'04
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
31
-
-
27544460282
-
Distributed Detection of Node Replication Attacks in Sensor Networks
-
May
-
B. Parno, A. Perrig, and V. D. Gligor, Distributed Detection of Node Replication Attacks in Sensor Networks, the 2005 IEEE Symposium on Security and Privacy, pp. 49-63, May 2005.
-
(2005)
the 2005 IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.D.3
-
32
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, SPINS: Security Protocols for Sensor Networks, ACM MobiCom'01, pp. 189-199, 2001.
-
(2001)
ACM MobiCom'01
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
33
-
-
4243082091
-
-
A. Perrig, J. Stankovic, and D. Wagner, Security in Wireless Sensor Networks, Communications of the ACM, 47(6), Special Issue on Wireless sensor networks, pp.53-57, Jun. 2004
-
A. Perrig, J. Stankovic, and D. Wagner, Security in Wireless Sensor Networks, Communications of the ACM, 47(6), Special Issue on Wireless sensor networks, pp.53-57, Jun. 2004
-
-
-
-
34
-
-
18844457825
-
SIA: Secure Information Aggregation in Sensor Networks
-
B. Przydatek, D. Song, and A. Perrig, SIA: Secure Information Aggregation in Sensor Networks, 1st International Conference on Embedded Networked Sensor Systems, 255-256, 2003
-
(2003)
1st International Conference on Embedded Networked Sensor Systems
, pp. 255-256
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
35
-
-
11144340927
-
Designing Secure Sensor Networks
-
Dec
-
E. Shi and A. Perrig, Designing Secure Sensor Networks, Wireless Communications, IEEE Volume 11, Issue 6, pp. 38-43, Dec. 2004.
-
(2004)
Wireless Communications, IEEE Volume 11, Issue
, vol.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
36
-
-
35048900024
-
Energy Efficient Routing with Guaranteed Delivery in Wireless Sensor Networks
-
IEEE March 2003 2003
-
D. Tian and N.D. Georganas, Energy Efficient Routing with Guaranteed Delivery in Wireless Sensor Networks, IEEE Wireless Communications and Networking (WCNC 2003), IEEE Volume 3, 1923-1929, March 2003
-
(1923)
IEEE Wireless Communications and Networking (WCNC
, vol.3
-
-
Tian, D.1
Georganas, N.D.2
-
37
-
-
20544450267
-
-
Nov
-
A. Woo, T. Tong, and D. Culler, Taming the Underlying Challenges of Reliable Multhop Routing in Sensor Networks, ACM SenSys03, Nov, 2003
-
(2003)
Taming the Underlying Challenges of Reliable Multhop Routing in Sensor Networks, ACM SenSys03
-
-
Woo, A.1
Tong, T.2
Culler, D.3
-
38
-
-
0036793924
-
Denial of Service in Sensor Networks
-
Oct
-
A. Wood and J. Stankovic, Denial of Service in Sensor Networks, IEEE Computer, Vol.35, 54-62, Oct. 2002
-
(2002)
IEEE Computer
, vol.35
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
39
-
-
29844441128
-
Toward Resilient Security in Wireless Sensor Networks
-
May
-
H.Yang, F. Ye, Y. Yuan, S. Lu and W. Arbough, Toward Resilient Security in Wireless Sensor Networks, ACM MobiHoc'05, 34-45, May 2005
-
(2005)
ACM MobiHoc'05
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbough, W.5
-
40
-
-
34547505521
-
-
Y. Yang, X. Wang, S. Zhu, and G. Cao SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks, ACM MobiHoc'06 May 2006
-
Y. Yang, X. Wang, S. Zhu, and G. Cao SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks, ACM MobiHoc'06 May 2006
-
-
-
-
41
-
-
3543100577
-
Statictial En-route Filtering of Injected False Data in Sensor Networks
-
F. Ye, H. Luo, S. Lu and L. Zhang, Statictial En-route Filtering of Injected False Data in Sensor Networks, IEEE INFOCOM, 2004
-
(2004)
IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
42
-
-
2442529460
-
-
WINET, March
-
F. Ye, G. Zhong, S. Lu and L. Zhang, GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks, ACM Wireless Networks (WINET), March 2005
-
(2005)
GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks, ACM Wireless Networks
-
-
Ye, F.1
Zhong, G.2
Lu, S.3
Zhang, L.4
-
44
-
-
25844473466
-
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach
-
March
-
W. Zhang and G. Cao, Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach, IEEE INFOCOM'05. Vol. 1, 503-514, March 2005
-
(2005)
IEEE INFOCOM'05
, vol.1
, pp. 503-514
-
-
Zhang, W.1
Cao, G.2
-
45
-
-
4544263123
-
Impact of radio irregularity on wireless sensor networks
-
June
-
G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic, Impact of radio irregularity on wireless sensor networks, the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys04), June, 2004
-
(2004)
the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys04)
-
-
Zhou, G.1
He, T.2
Krishnamurthy, S.3
Stankovic, J.A.4
-
46
-
-
10044284351
-
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
-
S. Zhu, S. Setia, and S. Jajodia, LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, The 10th ACM Conference on Computer and Communications Security (CCS'03), 62-72, 2003
-
(2003)
The 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
47
-
-
3543056512
-
An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks
-
S.Zhu, S. Setia, S. Jajodia, and P. Ning, An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks, IEEE Symposium on Security and Privacy, 2004
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|