-
1
-
-
34548028991
-
-
C. Karlof, D. Wagner, Secure routing in sensor networks: attacks and countermeasures, in: Proceedings of the 1st IEEE Workshop on Sensor Network Protocols and Applications, May 2003, pp. 1-15.
-
-
-
-
2
-
-
0036793924
-
Denial of service in sensor networks
-
Wood A.D., and Stankovic J.A. Denial of service in sensor networks. IEEE Computer 35 (2002) 54-62
-
(2002)
IEEE Computer
, vol.35
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
3
-
-
26444574670
-
-
C. Karlof, N. Sastry, D. Wagner, Tinysec: a link layer security architecture for wireless sensor networks, in: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004, pp. 162-175.
-
-
-
-
4
-
-
0036738266
-
Spins: security protocols for sensor networks
-
Perrig A., Szewczyk R., Tygar J.D., Wen V., and Culler D.E. Spins: security protocols for sensor networks. Wireless Network Journal 8 (2002) 521-534
-
(2002)
Wireless Network Journal
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
5
-
-
32144435943
-
-
A. Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, H. Wong, Decentralized intrusion detection in wireless sensor networks, in: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, 2005, pp. 16-23.
-
-
-
-
6
-
-
19544390497
-
-
B.J. Culpepper, H.C. Tseng, Sinkhole intrusion indicators in DSR MANETs, in: Proceedings of BroadNets '04, October 2004, pp. 681-688.
-
-
-
-
8
-
-
0034539015
-
-
C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: A scalable and robust communication paradigm for sensor networks, in: Proceedings of MobiCom '00, Aug 2000, pp. 56-67.
-
-
-
-
9
-
-
84904578657
-
-
F. Ye, A. Chen, S. Lu, L. Zhang, A scalable solution to minimum cost forwarding in large sensor networks, in: Proceedings of ICCCN '01, Oct 2001, pp. 304-309.
-
-
-
-
10
-
-
0036986248
-
-
D. Braginsky, D. Estrin, Rumour routing algorithm for sensor networks, in: Proceedings of the WSNA '02, September 2002, pp. 22-31.
-
-
-
-
11
-
-
0035789229
-
-
J. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of ACM MobiHoc '01, October 2001, pp. 146-155.
-
-
-
-
12
-
-
33646421331
-
Secure routing protocols for mobile ad-hoc wireless networks
-
Wysocki T.A., Dadej A., and Wysocki B.J. (Eds), Springer
-
Pirzada A.A., and McDonald C. Secure routing protocols for mobile ad-hoc wireless networks. In: Wysocki T.A., Dadej A., and Wysocki B.J. (Eds). Advanced Wired and Wireless Networks (2004), Springer
-
(2004)
Advanced Wired and Wireless Networks
-
-
Pirzada, A.A.1
McDonald, C.2
-
13
-
-
33845492142
-
-
F. Delgosha, F. Fekri, Key pre-distribution on wireless sensor networks using multivariate polynomials, in: Proceedings of SECON '05, September 2005, pp. 118-129.
-
-
-
-
14
-
-
30344482882
-
INSENS: intrusion-tolerant routing for wireless sensor networks
-
Deng J., Han R., and Mishra S. INSENS: intrusion-tolerant routing for wireless sensor networks. Elsevier Computer Communications 29 (2006) 216-230
-
(2006)
Elsevier Computer Communications
, vol.29
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
16
-
-
85177234360
-
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: security protocols for sensor networks, in: Proceedings of MobiCom '01, July 2001, pp. 189-199.
-
-
-
-
17
-
-
84920389231
-
-
D.E. Denning, An intrusion detection model, in: Proceedings of the IEEE Symposium on Security and Privacy, 1986, pp. 118-131.
-
-
-
-
18
-
-
85177499741
-
-
Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of MobiCom '00, August 2000, pp. 275-283.
-
-
-
-
19
-
-
4544258840
-
-
Y. Huang, W. Lee, A cooperative intrusion detection system for ad hoc networks, in: Proceedings of SASN '03, October 2003, pp. 135-147.
-
-
-
-
20
-
-
79953792886
-
Circumventing sinkholes and wormholes in ad-hoc wireless networks
-
Kings College, London
-
Pirzada A.A., and Mcdonald C.S. Circumventing sinkholes and wormholes in ad-hoc wireless networks. Proceedings of International Workshop on Wireless Ad-hoc Networks, London, England (2005), Kings College, London
-
(2005)
Proceedings of International Workshop on Wireless Ad-hoc Networks, London, England
-
-
Pirzada, A.A.1
Mcdonald, C.S.2
-
21
-
-
34548013346
-
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks, in: Proceedings of INFOCOM '05, March 2005, pp. 1976-1986.
-
-
-
-
22
-
-
3142684688
-
-
S.S. Doumit, D.P. Agrawal, Self-organized critically & stochastic learning based intrusion detection system for wireless sensor networks, in: Proceedings of MILCOM '03, October 2003, pp. 609-614.
-
-
-
-
23
-
-
0348195762
-
-
A.D. Wood, J.A. Standovic, S.H. Son, JAM: A jammed-area mapping service for sensor networks, in: Proceedings of RTSS '03, December 2003, pp. 286-297.
-
-
-
-
24
-
-
0036986435
-
-
J. Staddon, D. Balfanz, G. Durfee, Efficient tracing of failed nodes in sensor networks, in: Proceedings of WSNA '02, September 2002, pp. 122-130.
-
-
-
-
25
-
-
25844521520
-
-
M. Ding, D. Chen, K. Xing, X. Cheng, Localized fault-tolerant event boundary detection in sensor networks, in: Proceedings of INFOCOM '05, March 2005, pp. 902-913.
-
-
-
-
26
-
-
3543100577
-
-
F. Ye, H. Luo, S. Lu, L. Zhang, Statistical en-route filtering of injected false data in sensor networks, in: Proceedings of INFOCOM '04, March 2004, pp. 2446-2457.
-
-
-
-
27
-
-
24944466187
-
-
L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L.W. Chang, Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach, in: Proceedings of WCNC '05, March 2005, pp.1193-1199.
-
-
-
-
28
-
-
11244273945
-
-
L. Hu, D. Evans, Localization for mobile sensor networks, in: Proceedings of MobiCom '04, September 2004, pp. 45-57.
-
-
-
-
29
-
-
14844300164
-
-
D. Wagner, Resilient aggregation in sensor networks, in: Proceedings of SASN '04, October 2004, pp. 78-87.
-
-
-
-
30
-
-
0035271352
-
An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
-
Ye N., and Chen Q. An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Quality and Reliability Engineering International 17 (2001) 105-112
-
(2001)
Quality and Reliability Engineering International
, vol.17
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
-
31
-
-
35048891868
-
Keying hash functions for message authentication
-
Koblitz N. (Ed), Springer-Verlag, Berlin Germany
-
Bellare M., Canetti R., and Krawczyk H. Keying hash functions for message authentication. In: Koblitz N. (Ed). Advances in Cryptology CRYPTO '96. vol. 1109, of Lecture Notes in Computer Science (1996), Springer-Verlag, Berlin Germany 1-15
-
(1996)
Advances in Cryptology CRYPTO '96. vol. 1109, of Lecture Notes in Computer Science
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
32
-
-
3042822764
-
-
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proceedings of CCS '03, October 2003, pp. 52-61.
-
-
-
-
33
-
-
1542376949
-
-
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, M. Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, in: Proceedings of WSNA '03, September 2003, pp. 151-159.
-
-
-
-
34
-
-
10044284351
-
-
S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: Proceedings of CCS '03, October 2003, pp. 62-72.
-
-
-
-
36
-
-
34548020316
-
-
MPR/MID User's Manual, Document 7430-0021-06, Rev. B, Crossbow Technology, Inc., April 2005.
-
-
-
|