-
1
-
-
34548050722
-
-
L. Eschenauer, V.D. Gligor, A key management scheme for distributed sensor networks, in: Proceedings of the 9th ACM Conference on Computer and Communication Security.
-
-
-
-
2
-
-
28444433009
-
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 11-14, pp. 197- 213.
-
-
-
-
5
-
-
0034771605
-
SPINS: security protocols for sensor networks
-
Perrig A., et al. SPINS: security protocols for sensor networks. Proceedings of ACM MOBICOM (2001)
-
(2001)
Proceedings of ACM MOBICOM
-
-
Perrig, A.1
-
6
-
-
10044284351
-
-
S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: Proceedings of The 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., October, 2003.
-
-
-
-
7
-
-
34548025882
-
-
D. Carman, P. Kruus, B. Matt, Constraints and approaches for distributed sensor network security, NAI Labs Technical Report No. 00-010, September 2000.
-
-
-
-
8
-
-
8344262333
-
-
W. Du, J. Deng, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: Proceedings of IEEE INFOCOM 2004.
-
-
-
-
9
-
-
0017959977
-
Secure communication over insecure channels
-
Merkle R. Secure communication over insecure channels. Communications of the ACM 21 4 (1978) 294-299
-
(1978)
Communications of the ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.1
-
10
-
-
34548013797
-
-
R. Anderson, A. Perrig, Key infection: smart trust for smart dust, Unpublished Manuscript, November 2001.
-
-
-
-
14
-
-
0036793924
-
Denial of service in sensor networks
-
Wood A.D., and Stankovic J.A. Denial of service in sensor networks. Computer 35 10 (2002) 54-62
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
16
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
Ye F., Luo H., Lu S., and Zhang L. Statistical en-route detection and filtering of injected false data in sensor networks. Proceedings of IEEE INFOCOM (2004)
-
(2004)
Proceedings of IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
18
-
-
34548047041
-
-
M. Chen, W. Cui, V. Wen, A. Woo, Security and Deployment Issues in a Sensor Network, Ninja Project, A Scalable Internet ServicesArchitecture, Berkeley.
-
-
-
-
19
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach
-
Zhang W., and Cao G. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. Proceedings of INFOCOM (2005)
-
(2005)
Proceedings of INFOCOM
-
-
Zhang, W.1
Cao, G.2
-
23
-
-
0041939724
-
-
S. Shakkottai, R. Srikant, N. Shroff, Unreliable sensor grids: coverage, connectivity and diameter, in: Proceedings of the IEEE INFOCOM, 2003, pp. 1073-1083.
-
-
-
-
24
-
-
33750023217
-
-
X. Du, Y. Xiao, M. Guizani, H.H. Chen, An Effective Key Management Scheme for Heterogeneous Sensor Networks, Ad Hoc Networks, Elsevier, vol. 5, issue 1, January 2007, pp. 24-34.
-
-
-
-
25
-
-
34548038437
-
-
X. Du, M. Guizani, Y. Xiao, S. Ci, H.H. Chen, A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, in: IEEE Transactions on Wireless Communications, accepted for publication (to appear).
-
-
-
-
26
-
-
20344381294
-
-
D. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: Proceedings of 1st IEEE International Conference Communications and Networks (SECON), Santa Clara, CA, October 2004.
-
-
-
-
27
-
-
34548031429
-
-
N. Gura, A. Patel, A. Wander, H. Eberle, S.C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, in: Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, Boston, Massachusetts, August 2004.
-
-
-
-
28
-
-
33646581008
-
-
A.S. Wander, N. Gura, H. Eberle et al., Energy analysis of public-key cryptography for wireless sensor networks, in: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PERCOM), 2005.
-
-
-
-
29
-
-
33748959977
-
-
P. Traynor, H. Choi, G. Cao, S. Zhu, T. Porta, Establishing pair-wise keys in heterogeneous sensor networks, in: Proceedings of IEEE INFOCOM 06.
-
-
-
-
32
-
-
34548041679
-
-
F. Anjum, Location dependent key management using random key-predistribution in sensor networks, in: Proceedings of WiSe'06.
-
-
-
-
34
-
-
34548015902
-
-
W. Du, J. Deng, Y. Han, P.K. Varshney, A pairwise key predistribution scheme for wireless sensor networks, in: Proceedings of CCS'03.
-
-
-
|