-
1
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
Djenouri D., Khelladi L., and Badache A.N. A survey of security issues in mobile ad hoc and sensor networks. Communications Surveys & Tutorials, Fourth Quarter 7 4 (2005) 2-28
-
(2005)
Communications Surveys & Tutorials, Fourth Quarter
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, A.N.3
-
2
-
-
2442519150
-
-
S. Tanachaiwiwat, P. Dave, R. Bhindwale, A. Helmy, Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks, Performance, Computing, and Communications, 2004 IEEE International Conference, pp. 463-469.
-
-
-
-
3
-
-
34548038668
-
-
Enrique J. Duarte-Melo, Mingyan Liu, The effect of organization on energy consumption in wireless sensor networks, in: IEEE Globecom, 2002.
-
-
-
-
4
-
-
1542317846
-
-
M. Boghe, W. Trappe, An authentication framework for hierarchical ad hoc sensor networks, in: Proceedings of the 2003 ACM Workshop on Wireless Security, 2003, pp. 79-87.
-
-
-
-
5
-
-
34548028277
-
-
Rene Struik, Gregg Rasor, Mandatory ECC security algorithm suite, submissions to IEEE 802.15 Wireless Personal Area Network, March, 2002.
-
-
-
-
6
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig A., Szewczyk R., Tygar D., Wen V., and Culler D. SPINS: security protocols for sensor networks. Wireless Networks 8 5 (2002) 521-534
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, D.3
Wen, V.4
Culler, D.5
-
7
-
-
3042783638
-
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), October 2003, pp. 42-51.
-
-
-
-
8
-
-
28444454539
-
-
D. Huang, M. Mehta, D. Medhi, Source routing based pairwise key establishment protocol for sensor networks, in: Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 7-9 April 2005, pp. 177-183.
-
-
-
-
9
-
-
10044284351
-
-
S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: The 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003.
-
-
-
-
10
-
-
0033877788
-
-
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS), January 2000, pp. 3005-3014.
-
-
-
-
11
-
-
0036980295
-
-
H. Yang, X. Meng, S. Lu, Self-organized network-layer security in mobile ad hoc networks, in: ACM MOBICOM Wireless Security Workshop (WiSe'02), Atlanta, September 2002.
-
-
-
-
12
-
-
33645010795
-
Cluster-based self-organization management protocols for wireless sensor networks
-
Chang Y.C., Lin Z.S., and Chen J.L. Cluster-based self-organization management protocols for wireless sensor networks. IEEE Transactions on Consumer Electronics 52 1 (2006) 75-80
-
(2006)
IEEE Transactions on Consumer Electronics
, vol.52
, Issue.1
, pp. 75-80
-
-
Chang, Y.C.1
Lin, Z.S.2
Chen, J.L.3
-
13
-
-
34548042117
-
On the design of secure protocols for hierarchical sensor networks
-
Oliveira L.B., Wong H.C., Loureiro A.A.F., and Dahab R. On the design of secure protocols for hierarchical sensor networks. International Journal of Security and Networks 2 3/4 (2007) 216-227
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 216-227
-
-
Oliveira, L.B.1
Wong, H.C.2
Loureiro, A.A.F.3
Dahab, R.4
-
14
-
-
1542286901
-
-
Q. Huang, J. Cukier, H. Kobayashi, B. Liu, J. Zhang, Fast authenticated key establishment protocols for self-organizing sensor networks, in: Proceedings of the 2nd ACM international conference on WNA, 2003.
-
-
-
-
15
-
-
34548022659
-
-
A Manjeshwar, D.P. Agrawal, TEEN: a routing protocol for enhanced efficiency in wireless sensor networks, in: 1st International Workshop on parallel and distributed computing issues in wireless networks and mobile computing, April 2001.
-
-
-
-
16
-
-
34548013127
-
-
A. Manjeshwar, D.P. Agrrawal, APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks, in: Proceedings of the International Parallel and Distributed Processing Symposium, April 2002, pp. 48.
-
-
-
-
17
-
-
51949089156
-
-
S. Lindsey, C.S. Raghavendra, PEGASIS: power-efficient gathering in sensor information systems, in: IEEE Aerospace Conference Proceedings, vol. 3, March 2002, pp. 3-1125.
-
-
-
-
18
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
IEEE Computer Society, Los Alamitos, CA
-
Chan H., Perrig A., and Song D. Random key predistribution schemes for sensor networks. Proceedings of 2003 Symposium on Security and Privacy (2003), IEEE Computer Society, Los Alamitos, CA 197-215
-
(2003)
Proceedings of 2003 Symposium on Security and Privacy
, pp. 197-215
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
19
-
-
34548020020
-
-
R. Kannan, L. Ray, A. Durresi, Efficient key predistribution schemes for sensor networks, in: 1st European Workshop on Security in Wireless and Ad-Hoc Sensor Networks (ESAS'04), Heidelberg, Germany, August 2004.
-
-
-
-
20
-
-
4544301464
-
-
R.D. Pietro, L.V. Mancini, A. Mei, Random key assignment for secure wireless sensor networks, in: SASN '03: of the 1st ACM workshop on Security of Ad hoc and Sensor Networks, pp. 62-71, New York, USA, 2003.
-
-
-
-
21
-
-
24644507953
-
-
Adrian C. Ferreira et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks, LNCS vol. 3420, Springer, 2005, pp. 449-458.
-
-
-
-
22
-
-
34247216164
-
-
Loureiro, SecLEACH - a random key distribution solution for securing clustered sensor networks, in: 5th IEEE International Symposium on Network Computing and Applications (NCA'06), July 2006.
-
-
-
-
23
-
-
24944560667
-
-
C.C. Su, K.M. Chang, M.F. Horng, Y.H. Kuo, The new intrusion prevention and detection approaches for clustering-based sensor networks, in: IEEE Wireless Communications and Networking Conference (WCNC05), March 2005.
-
-
-
-
24
-
-
34548019516
-
-
S. Sanyal et al., Security scheme for distributed DoS in mobile ad hoc networks, in: 6th International Workshop on Distributed Computing (IWDC'04), vol. 3326, LNCS, Springer, 2004, p. 541.
-
-
-
-
25
-
-
30344482882
-
INSENS: intrusion-tolerant routing for wireless sensor networks
-
Deng J., Han R., and Mishra S. INSENS: intrusion-tolerant routing for wireless sensor networks. Computer Communications 29 2 (2006) 216-230
-
(2006)
Computer Communications
, vol.29
, Issue.2
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
26
-
-
27544468419
-
-
Issa Khalil, Saurabh Bagchi, Ness B. Shroff, LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless network, in: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN'05), 2005.
-
-
-
-
27
-
-
26444471877
-
Resilient cluster-organizing key management and secure routing protocol for mobile ad hoc networks
-
Lin H.Y., Huang Y.M., and Wang T.I. Resilient cluster-organizing key management and secure routing protocol for mobile ad hoc networks. IEICE Transaction on Communications E88-B 9 (2005) 3598-3613
-
(2005)
IEICE Transaction on Communications
, vol.E88-B
, Issue.9
, pp. 3598-3613
-
-
Lin, H.Y.1
Huang, Y.M.2
Wang, T.I.3
-
28
-
-
1542287664
-
-
P. Papadimitratos, Z.J. Haas, Secure data transmission in mobile ad hoc networks, 2003 ACM Wksp, Wireless Security, San Diego, CA, USA, 2003, pp. 41-50.
-
-
-
-
29
-
-
85177502983
-
-
S. Marti et al., Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom'00), August 2000.
-
-
-
-
30
-
-
34548011053
-
-
F. Kargl et al., Advanced detection of selfish or malicious nodes in ad hoc networks, in: 1st European Wksp. Security in Ad-Hoc and Sensor Networks, ESAS 2004, August 5-6, 2004.
-
-
-
-
31
-
-
0036980295
-
-
H. Yang, X. Meng, S. Lu, Self-organized network layer security in mobile ad hoc networks, in: ACM MOBICOM Wireless Security Wksp (WiSe'02), September 2002.
-
-
-
-
32
-
-
34548040729
-
-
P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Communications and Multimedia Security 2002 Conference, Portoroz, Slovenia, September 26-27, 2002.
-
-
-
-
33
-
-
34548038810
-
-
B. Awerbuch et al., An on-demand secure routing protocol resilient to byzantine failures, in: ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September 2002.
-
-
-
-
34
-
-
84866538231
-
-
F. Kargl, A. Klenk, M. Weber, S. Schlott, Sensors for detection of misbehaving nodes in MANETs, in: Proceedings of Detection of Intrusion and Malware and Vulnerability Assessment (DIMVA 2004), 2004.
-
-
-
-
35
-
-
0035101078
-
Toward self-organized mobile ad hoc networks: the terminodes project
-
Hubaux J., et al. Toward self-organized mobile ad hoc networks: the terminodes project. IEEE Communication Magazine 39 1 (2001) 118-124
-
(2001)
IEEE Communication Magazine
, vol.39
, Issue.1
, pp. 118-124
-
-
Hubaux, J.1
-
36
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
Buttyan L., and Hubaux J. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8 5 (2003) 579-592
-
(2003)
ACM/Kluwer Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.2
-
37
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Rabin M. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM 36 2 (1989) 335-348
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.1
-
38
-
-
0035789243
-
-
S. Yi, P. Naldurg, R. Kravets, Security-aware ad-hoc routing for wireless networks, in: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 2001, pp. 299-302.
-
-
-
-
39
-
-
23844494215
-
Cluster-based trust evaluation scheme in an ad hoc network
-
Jin S., Park C., Choi D., Chung K., and Yoon H. Cluster-based trust evaluation scheme in an ad hoc network. ETRI Journal 27 4 (2005) 465-468
-
(2005)
ETRI Journal
, vol.27
, Issue.4
, pp. 465-468
-
-
Jin, S.1
Park, C.2
Choi, D.3
Chung, K.4
Yoon, H.5
-
40
-
-
34548017685
-
-
C.E. Perkins, Terminology for ad-hoc networking, Draft-IETF-MANET-terms-00.txt, November 1997.
-
-
-
-
41
-
-
32644435647
-
Energy-efficient secure pattern based data aggregation for wireless sensor networks
-
Çam H., Özdemir S., Nair P., Muthuavinashiappan D., and Ozgur Sanli H. Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communications 29 4 (2006) 446-455
-
(2006)
Computer Communications
, vol.29
, Issue.4
, pp. 446-455
-
-
Çam, H.1
Özdemir, S.2
Nair, P.3
Muthuavinashiappan, D.4
Ozgur Sanli, H.5
-
42
-
-
24644489093
-
-
L.B. Oliveira, Hao Cho Wang, A.A Loureiro, LHA-SP: secure protocols for hierarchical wireless sensor networks, in: 9th IFIP/IEEE International Symposium on Integrated Network Management, May 2005, pp 31-44.
-
-
-
-
43
-
-
33745378852
-
-
M.Y. Hsieh, Y.M. Huang, A secure on-demand source routing with distributed authentication for trust-based ad hoc networks, LNCS 3779, 2005, pp. 343-350.
-
-
-
-
44
-
-
84948990100
-
The RC5 encryption algorithm
-
Preneel B. (Ed), Springer
-
Rivest R.L. The RC5 encryption algorithm. In: Preneel B. (Ed). Fast Software Encryption (1995), Springer 86-96
-
(1995)
Fast Software Encryption
, pp. 86-96
-
-
Rivest, R.L.1
|