-
1
-
-
25844439422
-
-
S. Capkun, J. Hubaux, Secure positioning of wireless devices with application to sensor networks, in: Proceedings of IEEE InfoCom, 2005, pp. 1917-1928.
-
-
-
-
2
-
-
34548820802
-
-
J. Deng, R. Han, S. Mishra, INSENS: intrusion-tolerant routing in wireless sensor networks, Technical Report, November 2002.
-
-
-
-
3
-
-
33745969132
-
-
J. Deng, R. Han, S. Mishra, Defending against path-based DoS attacks in wireless sensor networks, in: Proceedings of the Third ACM on the Security of Ad hoc and Sensor Networks (SASN 2005), 2005, pp. 89-96.
-
-
-
-
4
-
-
33144472210
-
-
S. Ganeriwal, S. Capkun, C. Han, M.B. Srivastava, Secure time synchronization service for sensor networks, in: Proceedings of the Fourth ACM Workshop on Wireless Security (WiSe 06), 2006, pp. 97-106.
-
-
-
-
5
-
-
0034539015
-
-
C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: Proceedings of ACM MobiCom, 2000, pp. 56-67.
-
-
-
-
6
-
-
84942426861
-
-
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: Proceedings of the 2003 IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 113-127.
-
-
-
-
7
-
-
0034547115
-
-
B. Karp, H. Kung, GPSR: greedy perimeter stateless routing for wireless networks, in: Proceedings of ACM MobiCom, 2000, pp. 243-254.
-
-
-
-
8
-
-
33745949686
-
-
Y.W. Law, L.V. Hoesel, J. Doumen, P. Hartel, P. Havinga, Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols, in: Proceedings of the Third ACM on the Security of Ad hoc and Sensor Networks (SASN 05), 2005, pp. 76-88.
-
-
-
-
9
-
-
33745931868
-
-
M. Manzo, T. Roosta, S. Sastry, Time synchronization attacks in sensor networks, in: Proceedings of the Third ACM Workshop on Security of Ad hoc and Sensor Networks, 2005, pp. 107-116.
-
-
-
-
10
-
-
85177187964
-
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar, SPINS: security protocols for sensor networks, in: Proceedings of ACM Mobicom, 2001, pp. 189-199.
-
-
-
-
11
-
-
0242443772
-
-
Y. Sankarasubramaniam, O.B. Akan, I.F. Akyildiz, ESRT: event to sink reliable transport in wireless sensor networks, in: Proceedings of ACM MobiHoc, 2003, pp. 177-188.
-
-
-
-
12
-
-
0036980191
-
-
C.Y. Wan, A.T. Campbell, L. Krishnamurthy, PSFQ: a reliable transport protocol for wireless sensor networks, in: Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002, pp. 1-11.
-
-
-
-
13
-
-
29844457889
-
-
W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in: Proceedings of ACM MobiHoc, 2005, pp. 46-57.
-
-
-
-
14
-
-
29844441128
-
-
H. Yang, F. Ye, Y. Yuan, S. Lu, W. Arbaugh, Toward resilient security in wireless sensor networks, in: Proceedings of ACM MobiHoc, 2005, pp. 34-45.
-
-
-
-
15
-
-
3543100577
-
-
F. Ye, H. Luo, S. Lu, L. Zhang, Statistical en-route filtering of injected false data in sensor networks, in: Proceedings of IEEE InfoCom, 2004, pp. 2446-2457.
-
-
-
-
16
-
-
34548841765
-
-
B. Yu, B. Xiao, Detecting selective forwarding attacks in wireless sensor networks, in: Proceedings of the Second International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), 2006, pp. 1-8.
-
-
-
-
17
-
-
34548851798
-
-
Y. Yu, D. Estrin, R. Govindan, Geographical and energy-aware routing: a recursive data dissemination protocol for wireless sensor networks, UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023, Technical Report, 2001.
-
-
-
-
18
-
-
85177502145
-
-
Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of ACM MobiCom, 2000, pp. 275-283.
-
-
-
-
19
-
-
3543056512
-
-
S. Zhu, S. Setia, S. Jajodia, N. Peng, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in: Proceedings of IEEE Symposium on Security and Privacy, 2004, pp. 259-271.
-
-
-
|