-
1
-
-
85074375621
-
Next century challenges: scalable coordination in sensor networks
-
Seattle, WA
-
Estrin D., Govindan R., Heidemann J., and Kumar S. Next century challenges: scalable coordination in sensor networks. Mobile Computing and Networking (MobiCom'99) (1999), Seattle, WA 263-270
-
(1999)
Mobile Computing and Networking (MobiCom'99)
, pp. 263-270
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.3
Kumar, S.4
-
2
-
-
0345851235
-
Wireless integrated network sensors
-
Pottie G.J., and Kaiser W.J. Wireless integrated network sensors. Comm. ACM 43 5 (2000) 51-58
-
(2000)
Comm. ACM
, vol.43
, Issue.5
, pp. 51-58
-
-
Pottie, G.J.1
Kaiser, W.J.2
-
3
-
-
2942656255
-
-
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, Elsevier's AdHoc Networks J. 1(2-3): 293-315, 2003 (special issue on sensor network applications and protocols) Also appeared in 1st IEEE International Workshop on Sensor Network Protocols and Applications.
-
-
-
-
4
-
-
0036793924
-
Denial of service in sensor networks
-
Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Comput. 35 10 (October 2002) 54-62
-
(2002)
IEEE Comput.
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
5
-
-
0010461175
-
-
Technical Report, NAI Labs, The Security Research Division, Network Associates, Inc.
-
Carman D.W., Kruus P.S., and Matt B.J. Constraints and approaches for distributed sensor network security (2000), Technical Report, NAI Labs, The Security Research Division, Network Associates, Inc.
-
(2000)
Constraints and approaches for distributed sensor network security
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
6
-
-
0038341106
-
-
L. Eschenauer, V.D. Gligor, A key management scheme for distributed sensor networks, in: 9th ACM Conference on Computer and Communications Security (CCS'02), ACM New York, 2002, pp. 41-47.
-
-
-
-
7
-
-
28444433009
-
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: IEEE Symposium on Security and Privacy (S&P'03), May 2003, pp. 197-213.
-
-
-
-
8
-
-
10044284351
-
-
S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: 10th ACM Conference on Computer and Communication Security, ACM Press, New York, 2003, pp. 62-72.
-
-
-
-
9
-
-
34547917139
-
-
D. Liu, P. Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, in: 10th Annual Network and Distributed Systems Security Symposium (NDSS'03), 2003, pp. 263-276.
-
-
-
-
10
-
-
4544293215
-
-
D. Liu, P. Ning, Location-based pairwise key establishments for static sensor networks, in: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), ACM Press, New York, 2003, pp. 72-82.
-
-
-
-
11
-
-
1542286901
-
-
Q. Huang, J. Cukier, H. Kobayashi, B. Liu, J. Zhang, Fast authenticated key establishment protocols for self-organizing sensor networks, in: 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA'03), ACM Press, New York, 2003, pp. 141-150.
-
-
-
-
12
-
-
84943553152
-
-
S. Zhu, S. Xu, S. Setia, S. Jajodia, Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach, in: 11th IEEE International Conference on Network Protocols (ICNP'03), Atlanta, November 2003, pp. 326-335.
-
-
-
-
13
-
-
4544301464
-
-
in: SASN '03: of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, USA pp. 62-71
-
Di Pietro R., Mancini L.V., and Mei A. Random key-assignment for secure wireless sensor networks (2003), in: SASN '03: of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, USA pp. 62-71
-
(2003)
Random key-assignment for secure wireless sensor networks
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
14
-
-
8344262333
-
-
W. Du, J. Deng, Y.S.H.S. Chen, P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Conference of the IEEE Communications Society (INFOCOM'04), 2004.
-
-
-
-
15
-
-
14844335004
-
-
J. Hwang, Y. Kim, Revisiting random key pre-distribution schemes for wireless sensor networks, in: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM Press, New York, 2004, pp. 43-52.
-
-
-
-
16
-
-
14844314204
-
-
D. Huang, M. Mehta, D. Medhi, L. Harn, Location-aware key management scheme for wireless sensor networks, in: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'04), ACM Press, New York, 2004, pp. 29-42.
-
-
-
-
17
-
-
34547896947
-
-
R. Kannan, L. Ray, A. Durresi, Efficient key pre-distribution schemes for sensor networks, in: 1st European Workshop on Security in Wireless and Ad-Hoc Sensor Networks (ESAS' 04), Heidelberg, Germany, August 2004.
-
-
-
-
18
-
-
35048867517
-
-
S.A. Çamtepe, B. Yener, Combinatorial design of key distribution mechanisms for wireless sensor networks. in: 9th European Symposium on Research Computer Security (ESORCS' 04), Lecture Notes in Computer Science, Sophia Antipolis, France, September 2004, pp. 293-308.
-
-
-
-
19
-
-
16644374371
-
-
D. Liu, P. Ning, R. Li, Establishing pairwise keys in distributed sensor networks, ACM Trans. Inf. Syst. Security, 8 (1) (2005) 41-77, 2005. Also appeared in 10th ACM CCS '03.
-
-
-
-
20
-
-
23244467182
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du W., Deng J., Han Y.S., Varshney P.K., Katz J., and Khalili A. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Security 8 2 (2005) 228-258
-
(2005)
ACM Trans. Inf. Syst. Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
21
-
-
25844435733
-
-
H. Chan, A. Perrig, PIKE: peer intermediaries for key establishment in sensor networks, in: The 24th Conference of the IEEE Communications Society (INFOCOM'05), March 2005.
-
-
-
-
22
-
-
34547879585
-
-
R. Di Pietro, L.V. Mancini, A. Mei, Efficient and resilient key discovery based on pseudo-random key pre-deployment, Wireless Networks 12(6) (2006). Also appeared in 4th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks 2004.
-
-
-
-
23
-
-
0036688074
-
A survey on sensor network
-
Akyildiz I.F., Su W., Sankarasubramaniam Y., and Cayirci E. A survey on sensor network. IEEE Commun. Mag. 40 8 (August 2002) 102-114
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
24
-
-
85034572933
-
-
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in: IEEE Hawaii International Conference on System Sciences, January 2000, pp. 4-7.
-
-
-
-
25
-
-
4544285741
-
-
O. Younis, S. Fahmy, Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach, in: Conference of the IEEE Communications Society (INFOCOM'04), 2004, pp. 629-640.
-
-
-
-
26
-
-
34547923648
-
-
B. Schneier, Applied Cryptography, second ed., Wiley, New York, 1996.
-
-
-
-
27
-
-
0036738266
-
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: security protocols for sensor networks, Wireless Networks 8 (5) (September 2002) 521-534, also appeared in MobiCom'01.
-
-
-
-
28
-
-
17544377081
-
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, K. Pister, System architecture directions for networked sensors, in: 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000, pp. 93-104.
-
-
-
-
29
-
-
26444574670
-
-
C. Karlof, N. Sastry, D. Wagner, Tinysec: a link layer security architecture for wireless sensor networks, in: 2nd ACM SensSys, November 2004, pp. 162-175.
-
-
-
-
30
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L., and Haas Z.J. Securing ad hoc networks. IEEE Network 13 6 (1999) 24-30
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
31
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Capkun S., Buttyan L., and Hubaux J.P. Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2 1 (January-March 2003) 17
-
(2003)
IEEE Trans. Mobile Comput.
, vol.2
, Issue.1
, pp. 17
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
32
-
-
0035789229
-
-
J.-P. Hubaux, L. Buttyán, S. Capkun, The quest for security in mobile ad hoc networks, in: 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, ACM Press, New York, 2001, pp. 146-155.
-
-
-
-
33
-
-
1542317847
-
Biss: building secure routing out of an incomplete set of security associations
-
ACM Press, New York
-
Capkun S., and Hubaux J.-P. Biss: building secure routing out of an incomplete set of security associations. ACM Workshop on Wireless Security (WISE'03) (2003), ACM Press, New York 21-29
-
(2003)
ACM Workshop on Wireless Security (WISE'03)
, pp. 21-29
-
-
Capkun, S.1
Hubaux, J.-P.2
-
34
-
-
0034590150
-
-
L. Venkatraman. D.P. Agrawal, A novel authentication scheme for ad hoc networks, in: IEEE Wireless Communications and Networking Conference, 2002, pp. 1268-1273.
-
-
-
-
36
-
-
0034546898
-
-
in: 6th Annual International Conference on Mobile Computing and Networking, ACM Press, New York pp. 275-283
-
Zhang Y., and Lee W. Intrusion detection in wireless ad-hoc networks (2000), in: 6th Annual International Conference on Mobile Computing and Networking, ACM Press, New York pp. 275-283
-
(2000)
Intrusion detection in wireless ad-hoc networks
-
-
Zhang, Y.1
Lee, W.2
-
37
-
-
3543100577
-
-
F. Yea, H. Luo, S. Lu, L. Zhang, Statistical en-route filtering of injected false data in sensor networks, in: Conference of the IEEE Communications Society (INFOCOM'04), 2004.
-
-
-
-
38
-
-
85015402934
-
-
V. Miller, Uses of elliptic curves in cryptography, advances in cryptology, in: Crypto'85, Lecture Notes in Computer Science, vol. 218, Berlin, Springer, 1986, pp. 417-426.
-
-
-
-
39
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N. Elliptic curve cryptosystems. Math. Comput. 48 (1987) 203-209
-
(1987)
Math. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
40
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
Cambridge, MA, USA
-
Gura N., Patel A., Wander A., Eberle H., and Shantz S.C. Comparing elliptic curve cryptography and rsa on 8-bit cpus. Workshop on Cryptographic Hardware and Embedded Systems (CHES) (2004), Cambridge, MA, USA 119-132
-
(2004)
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
41
-
-
20344381294
-
-
D.J. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography, in: 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON'04), Santa Clara, California, October 2004.
-
-
-
-
42
-
-
33745834406
-
-
E.-O. Blaß, M. Zitterbart, Towards acceptable public-key encryption in sensor networks, in: The 2nd International Workshop on Ubiquitous Computing, ACM SIGMIS, May 2005.
-
-
-
-
43
-
-
29844457287
-
-
W. Du, R. Wang, P. Ning, An efficient scheme for authenticating public keys in sensor networks, in: 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05), New York, NY, USA, ACM Press, New York, 2005, pp. 58-67.
-
-
-
-
44
-
-
0345755816
-
-
J. Kong, H. Luo, K. Xu, D.L. Gu, M. Gerla, S. Lu, Adaptive Security for Multi-layer Ad-hoc Networks, Wiley New York, Wireless Commun. Mobile Comput. 2 (5) (2002) 533-547 (special issue).
-
-
-
-
45
-
-
1542317846
-
-
M. Bohge, W. Trappe, An authentication framework for hierarchical ad hoc sensor networks, in: 2003 ACM Workshop on Wireless Security, 2003, pp. 79-87.
-
-
-
-
46
-
-
85177498148
-
-
S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Mobile Computing and Networking, 2000, pp. 255-265.
-
-
-
-
47
-
-
3543056512
-
-
S. Zhu, S. Setia, S. Jajodia, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in: IEEE Symposium on Security and Privacy, 2004. pp. 259-271.
-
-
-
-
48
-
-
34547912820
-
-
B. Przydatek, D. Song, A. Perrig, SIA: secure information aggregation in sensor networks, in: ACM SenSys 2003, November 2003.
-
-
-
-
49
-
-
0041973497
-
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless sensor networks, in: Conference of the IEEE Communications Society (INFOCOM'03), 2003.
-
-
-
-
50
-
-
3042785862
-
-
J. Newsome, R. Shi, D. Song, A. Perrig, The sybil attack in sensor networks: analysis and defenses, in: IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004), April 2004.
-
-
-
-
52
-
-
0000153536
-
Distance to nearest neighbor as a measure of spatial relationships in populations
-
Clark P.J., and Evans F.C. Distance to nearest neighbor as a measure of spatial relationships in populations. Ecology 35 4 (1954) 445-453
-
(1954)
Ecology
, vol.35
, Issue.4
, pp. 445-453
-
-
Clark, P.J.1
Evans, F.C.2
-
53
-
-
34547865311
-
-
K.P. Donnelly, Simulations to determine the variance and edge effect of total nearest neighbour distance, in: I. Hodder (Ed.) Simulation Studies in Archaeology, 1978.
-
-
-
-
54
-
-
24644489093
-
-
L.B. Oliveira, H.C. Wong, A.A.F. Loureiro, LHA-SP: Secure protocols for hierarchical wireless sensor networks, in: Ninth International Symposium on Integrated Network Management (IM'05), IFIP/IEEE, May 2005, Nice, France, pp. 31-44.
-
-
-
|