-
1
-
-
4243082091
-
Security in wireless sensor networks
-
PERRIG A, et al. Security in wireless sensor networks [J]. Communications of the ACM, 2004, 47(6): 53-57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
-
2
-
-
10644250089
-
Security considerations in ad hoc sensor networks
-
FEI H, NEERAJ K. Security considerations in ad hoc sensor networks [J]. Ad hoc Networks, 2005, 1(3): 69-89.
-
(2005)
Ad hoc Networks
, vol.1
, Issue.3
, pp. 69-89
-
-
Fei, H.1
Neeraj, K.2
-
3
-
-
34047195742
-
Cross-layer design for the security of wireless sensor networks intelligent control and automation
-
XIAO M B, et al. Cross-layer design for the security of wireless sensor networks intelligent control and automation [A]. WCICA 2006. The Sixth World Congress [C]. 2006.104-108.
-
(2006)
WCICA 2006. The Sixth World Congress
, pp. 104-108
-
-
Xiao, M.B.1
-
4
-
-
34648839013
-
On communication security in wireless Ad-hoc sensor network eleventh IEEE international workshops on enabling technologies: Infrastructure for collaborative enterprises
-
Pittsburgh, Pennsylvania
-
SLIJEPCEVIC S, et al. On communication security in wireless Ad-hoc sensor network eleventh IEEE international workshops on enabling technologies: infrastructure for collaborative enterprises [A] (WETICE'02) [C]. Pittsburgh, Pennsylvania, 2002. 10-12.
-
(2002)
WETICE'02
, pp. 10-12
-
-
Slijepcevic, S.1
-
13
-
-
34648859668
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
Santa Clara, California
-
DAVID J M, et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography [A]. First IEEE International Conference on Sensor and Ad hoc Communications and Networks [C]. Santa Clara, California, 2004.58-67.
-
(2004)
First IEEE International Conference on Sensor and Ad hoc Communications and Networks
, pp. 58-67
-
-
David, J.M.1
-
17
-
-
49949083706
-
Elliptic curve cryptography-based access control in sensor networks
-
WANG H, et al. Elliptic curve cryptography-based access control in sensor networks[J]. Int J Security and Networks, 2006, 1(3): 127-137.
-
(2006)
Int J Security and Networks
, vol.1
, Issue.3
, pp. 127-137
-
-
Wang, H.1
-
18
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
PERRIG A, el al. SPINS: security protocols for sensor networks [J]. Wireless Networks Journal (WINE), 2002, 8(5): 521-534.
-
(2002)
Wireless Networks Journal (WINE)
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
-
20
-
-
33745178053
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Hong Kong
-
DU W, et al. A key management scheme for wireless sensor networks using deployment knowledge [A]. IEEE INFOCOM'04 [C]. Hong Kong, 2004.7-11.
-
(2004)
IEEE INFOCOM'04
, pp. 7-11
-
-
Du, W.1
-
21
-
-
34648855330
-
Location-based pairwise key establishments for relatively static sensor networks
-
VA, USA
-
LIU D, et al. Location-based pairwise key establishments for relatively static sensor networks [A]. ACM Workshop on Security of Ad hoc and Sensor Networks [C]. VA, USA, 2003.61-77.
-
(2003)
ACM Workshop on Security of Ad hoc and Sensor Networks
, pp. 61-77
-
-
Liu, D.1
-
23
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington
-
LIU D, et al. Establishing pairwise keys in distributed sensor networks [A]. ACM Conference on Computer and Communications Security [C]. Washington, 2003.52-61.
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
-
24
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, California
-
CHAN H, et al. Random key predistribution schemes for sensor networks [A]. Proceedings of IEEE Symposium on Security and Privacy [C]. Berkeley, California, 2003.197-213.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
-
25
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DU W, et al. A pairwise key predistribution scheme for wireless sensor networks[J]. The ACM Transactions on Information and System Security, 2005.1-10.
-
(2005)
The ACM Transactions on Information and System Security
, pp. 1-10
-
-
Du, W.1
-
26
-
-
33646918277
-
Dynamic key management in sensor networks
-
ELTOWEISSY M, et al. Dynamic key management in sensor networks[J]. Communications Magazine, IEEE, 44(4), 2006: 122-130.
-
(2006)
Communications Magazine, IEEE
, vol.44
, Issue.4
, pp. 122-130
-
-
Eltoweissy, M.1
-
27
-
-
33845540890
-
New key management scheme of wireless sensor networks based on key relation table
-
HUANG H P, WANG R C, SUN L J, et al. New key management scheme of wireless sensor networks based on key relation table [J]. Journal on Communications, 2006, 27(10): 13-18.
-
(2006)
Journal on Communications
, vol.27
, Issue.10
, pp. 13-18
-
-
Huang, H.P.1
Wang, R.C.2
Sun, L.J.3
-
28
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
LIU D, et al. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks [A]. Proceedings of the 10th Annual Network and Distributed System Security Symposium [C]. 2003.263-276.
-
(2003)
Proceedings of the 10th Annual Network and Distributed System Security Symposium
, pp. 263-276
-
-
Liu, D.1
-
30
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
Oakland, California
-
ZHU S, et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks [A]. Proc IEEE Symposium on Security and Privacy [C]. Oakland, California, 2004.259-271.
-
(2004)
Proc IEEE Symposium on Security and Privacy
, pp. 259-271
-
-
Zhu, S.1
-
31
-
-
34247270218
-
Design of secure dynamic clustering algorithm using SNEP and μTESLA in Sensor network
-
JANG K W, et al. Design of secure dynamic clustering algorithm using SNEP and μTESLA in Sensor network [A]. Hybrid information Technology, 2006. international Conference [C]. 2006.97-102.
-
(2006)
Hybrid information Technology, 2006. international Conference
, pp. 97-102
-
-
Jang, K.W.1
-
32
-
-
85000276942
-
Multi-level μTESLA: A broadcast authentication system for distributed sensor networks
-
LIU D, NING P. Multi-level μTESLA: a broadcast authentication system for distributed sensor networks[J]. ACM Transactions on Embedded Computing Systems (TECS), 2004, 3(4): 800-836.
-
(2004)
ACM Transactions on Embedded Computing Systems (TECS)
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
34
-
-
34249307318
-
MMμ TESLA: Broadcast authentication protocil for multiple-based-statkm
-
SHEN Y L, PEI Q, MA J F. MMμ TESLA: broadcast authentication protocil for multiple-based-statkm [J]. Chinese Journal of Computers, 2007, 30(4): 539-546.
-
(2007)
Chinese Journal of Computers
, vol.30
, Issue.4
, pp. 539-546
-
-
Shen, Y.L.1
Pei, Q.2
Ma, J.F.3
-
35
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
KARLOF C, et al. Secure routing in wireless sensor networks: attacks and countermeasures [J]. Ad hoc Networks, 2003, (1): 293-315.
-
(2003)
Ad hoc Networks
, Issue.1
, pp. 293-315
-
-
Karlof, C.1
-
39
-
-
33746375987
-
SPREAD: A hybrid multipara scheme for secure and reliable data collection in wireless sensor networks
-
LOU W J, et al. SPREAD: a hybrid multipara scheme for secure and reliable data collection in wireless sensor networks [J]. Vehicular Technology, IEEE Transactions, 2006, 55(4): 1320-1330.
-
(2006)
Vehicular Technology, IEEE Transactions
, vol.55
, Issue.4
, pp. 1320-1330
-
-
Lou, W.J.1
-
40
-
-
0013043106
-
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
-
GANESAN D, et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks [J]. Mobile, Computing and Communication Review, 2001, 5(4): 10-24.
-
(2001)
Mobile, Computing and Communication Review
, vol.5
, Issue.4
, pp. 10-24
-
-
Ganesan, D.1
-
41
-
-
84944414611
-
ReInForM: Reliable information forwarding using multiple paths in sensor networks
-
Los Alamitos
-
DEB B, et al. ReInForM: reliable information forwarding using multiple paths in sensor networks [A]. Proc 28th Annual IEEE Conf on Local Computer Networks (LCN) [C]. Los Alamitos, 2003.406-415.
-
(2003)
Proc 28th Annual IEEE Conf on Local Computer Networks (LCN)
, pp. 406-415
-
-
Deb, B.1
-
42
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
ZHANG Y C, et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks [J]. Selected Areas in Communications, IEEE Journal, 2006, 24(2): 247-260.
-
(2006)
Selected Areas in Communications, IEEE Journal
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.C.1
-
43
-
-
25844521520
-
Localized fault-tolerant event boundary detection in sensor networks
-
DING M, et al. Localized fault-tolerant event boundary detection in sensor networks [A]. IEEE INFOCOM [C]. 2005.902-913.
-
(2005)
IEEE INFOCOM
, pp. 902-913
-
-
Ding, M.1
-
46
-
-
0036793924
-
Denial of service in sensor networks
-
WOOD A D, et al. Denial of service in sensor networks [J]. IEEE Computer, 2002, 35(10): 54-62.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
-
47
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
Oakland
-
MCCUNE J, et al. Detection of denial-of-message attacks on sensor network broadcasts [A]. Proc of the IEEE Symposium on Security and Privacy [C]. Oakland, 2005.64-78.
-
(2005)
Proc of the IEEE Symposium on Security and Privacy
, pp. 64-78
-
-
Mccune, J.1
-
48
-
-
33745969132
-
Defending against path-based DoS attacks in wireless sensor networks
-
Alexandria, Virginia
-
DENG J, et al. Defending against path-based DoS attacks in wireless sensor networks [A]. Proceedings of the 10th ACM Conference on Computer and Communications [C]. Alexandria, Virginia, 2005. 89-96.
-
(2005)
Proceedings of the 10th ACM Conference on Computer and Communications
, pp. 89-96
-
-
Deng, J.1
-
50
-
-
33750897362
-
An architecture for flexible access to sensor networks
-
Cologne
-
DUNKELS A, et al. An architecture for flexible access to sensor networks [A]. DIN'05 [C]. Cologne, 2005. 48-52.
-
(2005)
DIN'05
, pp. 48-52
-
-
Dunkels, A.1
-
51
-
-
33746862074
-
An algorithmic framework for robust access control in wireless sensor networks
-
Istanbul
-
BENENSON Z, et al. An algorithmic framework for robust access control in wireless sensor networks [A]. 2nd European Workshop on Wireless Sensor Networks (EWSN) [C]. Istanbul, 2005. 158-165.
-
(2005)
2nd European Workshop on Wireless Sensor Networks (EWSN)
, pp. 158-165
-
-
Benenson, Z.1
-
52
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
Illinois
-
ZHANG W, et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks [A]. Proc IEEE Symposium on Security and Privacy [C]. Illinois, 2005.378-389.
-
(2005)
Proc IEEE Symposium on Security and Privacy
, pp. 378-389
-
-
Zhang, W.1
-
54
-
-
33746507111
-
E-μTESLA: An efficient broadcast authentication protocol for wireless sensor network
-
WANG L M, MA J F, et al, E-μTESLA: an efficient broadcast authentication protocol for wireless sensor network [J]. Journal of Computational Information Systems, 2005, 1(3): 433-438.
-
(2005)
Journal of Computational Information Systems
, vol.1
, Issue.3
, pp. 433-438
-
-
Wang, L.M.1
Ma, J.F.2
-
55
-
-
34648859658
-
Alex chichung kot, fault and intrusion tolerance of wireless sensor networks
-
Rhode Island, Greece
-
WANG L M, MA J F, et al. Alex chichung kot, fault and intrusion tolerance of wireless sensor networks [A]. Proceedings. 20th International Parallel and Distributed Processing Symposium [C]. Rhode Island, Greece, 2006.7-14.
-
(2006)
Proceedings. 20th International Parallel and Distributed Processing Symposium
, pp. 7-14
-
-
Wang, L.M.1
Ma, J.F.2
-
56
-
-
27944456428
-
Survey on wireless sensors network
-
MA Z C, SUN Y N, MEI T. Survey on wireless sensors network [J]. Journal on Communications, 2004, 25(4): 114-124.
-
(2004)
Journal on Communications
, vol.25
, Issue.4
, pp. 114-124
-
-
Ma, Z.C.1
Sun, Y.N.2
Mei, T.3
-
57
-
-
33750598206
-
Domain-based key management for wireless sensor networks
-
LIU Z H, MA J F, HUANG Q P. Domain-based key management for wireless sensor networks [J]. Chinese Journal of Computers, 2006, 29(9): 1608-1616.
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.9
, pp. 1608-1616
-
-
Liu, Z.H.1
Ma, J.F.2
Huang, Q.P.3
-
58
-
-
33750213386
-
Degree of fault-tolerance and intrusion-tolerance for topologies of wireless sensor networks
-
WANG L M, MA J F, WANG C. Degree of fault-tolerance and intrusion-tolerance for topologies of wireless sensor networks[J]. Acta Electronica Sinica, 2006, 34(8): 1446-1451.
-
(2006)
Acta Electronica Sinica
, vol.34
, Issue.8
, pp. 1446-1451
-
-
Wang, L.M.1
Ma, J.F.2
Wang, C.3
|